Paillier cryptosystem

Results: 121



#Item
51Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-04-25 03:42:22
52Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed]  Rosario Gennaro

Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed] Rosario Gennaro

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-08 09:13:05
53CS255: Cryptography and Computer Security  Winter 2001 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:17
544-3 A Survey on Oblivious Transfer Protocols Le Trieu Phong In this paper, we survey some constructions of oblivious transfer (OT) protocols from public key encryption schemes. We begin with a simple construction of 1-o

4-3 A Survey on Oblivious Transfer Protocols Le Trieu Phong In this paper, we survey some constructions of oblivious transfer (OT) protocols from public key encryption schemes. We begin with a simple construction of 1-o

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:07:55
55Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Processing Analytical Queries over Encrypted Data Stephen Tu M. Frans Kaashoek Samuel Madden MIT CSAIL

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
56Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:12:09
57CS255: Cryptography and Computer Security  Winter 2001 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-05-13 22:32:41
58CS255: Cryptography and Computer Security  Winter 2001 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-01-05 20:38:47
59CS255: Cryptography and Computer Security  Winter 2001 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:04
60Machine Learning Classification over Encrypted Data Raphael Bost Raluca Ada Popa  Stephen Tu

Machine Learning Classification over Encrypted Data Raphael Bost Raluca Ada Popa Stephen Tu

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-02-07 13:16:35