Paillier cryptosystem

Results: 121



#Item
21AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
22Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs†  April 29, 2015

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
23Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi  ?

Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 15:33:43
24This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-05-06 09:12:34
25A Generalization of Paillier’s Public-Key System with Applications to Electronic Voting Ivan Damg˚ ard, Mads Jurik and Jesper Buus Nielsen Aarhus University, Dept. of Computer Science, BRICS?

A Generalization of Paillier’s Public-Key System with Applications to Electronic Voting Ivan Damg˚ ard, Mads Jurik and Jesper Buus Nielsen Aarhus University, Dept. of Computer Science, BRICS?

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:06:04
26RSA Threshold Cryptography H.L. Nguyen May 4, 2005 Dept. of Computer Science, University of Bristol, Merchant Venturers Building,

RSA Threshold Cryptography H.L. Nguyen May 4, 2005 Dept. of Computer Science, University of Bristol, Merchant Venturers Building,

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2013-06-06 21:32:07
27Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI

Add to Reading List

Source URL: www.heinz.cmu.edu

Language: English - Date: 2004-05-26 11:53:01
28Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University  of Luxembourg, Faculty of Sciences, Technology and Communication

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
29Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998  Magenta is an encryption algorithm submitted for AES by Deutsche

Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
30Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang†  Dongdai Lin∗

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37