Paillier cryptosystem

Results: 121



#Item
31Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience? Martin Hirt1 , Jesper Buus Nielsen2 , and Bartosz Przydatek1 1  2

Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience? Martin Hirt1 , Jesper Buus Nielsen2 , and Bartosz Przydatek1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-03 06:46:06
32A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005  Abstract

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
33I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 16:02:26
34On the Impossibility of Batch Update for Cryptographic Accumulators Philippe Camacho Dept. of Computer Science, University of Chile, Blanco Encalada 2120, 3er piso, Santiago, Chile.

On the Impossibility of Batch Update for Cryptographic Accumulators Philippe Camacho Dept. of Computer Science, University of Chile, Blanco Encalada 2120, 3er piso, Santiago, Chile.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 20:16:12
35Sorting and Searching Behind the Curtain Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data* Foteini Baldimtsi1 and Olga Ohrimenko2 1

Sorting and Searching Behind the Curtain Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data* Foteini Baldimtsi1 and Olga Ohrimenko2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-27 11:25:46
36Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract

Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-05-20 02:15:48
37Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1  Vincenzo Iovino2

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-06 07:23:00
38A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting and Po-Yueh Hung Department of Computer Science, National Taiwan Ocean University {pyting, m92570002}@mail.ntou.edu.tw

A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting and Po-Yueh Hung Department of Computer Science, National Taiwan Ocean University {pyting, m92570002}@mail.ntou.edu.tw

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-04 01:29:08
39HEtest: A Homomorphic Encryption Testing Framework Mayank Varia1 , Sophia Yakoubov1 , and Yang Yang2,? 1 MIT Lincoln Laboratory?? , {mayank.varia, sophia.yakoubov}@ll.mit.edu 2

HEtest: A Homomorphic Encryption Testing Framework Mayank Varia1 , Sophia Yakoubov1 , and Yang Yang2,? 1 MIT Lincoln Laboratory?? , {mayank.varia, sophia.yakoubov}@ll.mit.edu 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-02 17:15:17
40New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2001-12-26 10:46:32