Paillier cryptosystem

Results: 121



#Item
61Information Security and Computer Fraud, 2013, Vol. 1, No. 1, 1-7 Available online at http://pubs.sciepub.com/iscf/1/1/1 © Science and Education Publishing DOI:[removed]iscf[removed]Simplified Verifiable Re-encryption Mi

Information Security and Computer Fraud, 2013, Vol. 1, No. 1, 1-7 Available online at http://pubs.sciepub.com/iscf/1/1/1 © Science and Education Publishing DOI:[removed]iscf[removed]Simplified Verifiable Re-encryption Mi

Add to Reading List

Source URL: www.sciepub.com

Language: English
62Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-05-29 07:38:50
63An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.ippari.unict.it

Language: English - Date: 2009-01-08 04:52:18
64Introduction  Public Key Compression Approximate-GCD

Introduction Public Key Compression Approximate-GCD

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
65On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin ANSSI, France  18 April, EUROCRYPT 2012

On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin ANSSI, France 18 April, EUROCRYPT 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:21
66Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1

Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-05-22 23:40:41
67Proceedings of the 20th ACM Symposium on Principles of Distributed Computing (PODC ’[removed] – 29 august 2001, Newport, Rhode Island, USA) N. Shavit Ed. ACM Press, New York, pages 274–283. Practical Multi-Candidate

Proceedings of the 20th ACM Symposium on Principles of Distributed Computing (PODC ’[removed] – 29 august 2001, Newport, Rhode Island, USA) N. Shavit Ed. ACM Press, New York, pages 274–283. Practical Multi-Candidate

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:36:02
68Cloud	
  encryp-on	
  –	
  	
   Encrypt	
  all	
  the	
  things!	
   Walter	
  Tighzert	
   German	
  Owasp	
  Day	
  2014	
    About	
  me	
  

Cloud  encryp-on  –     Encrypt  all  the  things!   Walter  Tighzert   German  Owasp  Day  2014   About  me  

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-13 17:47:56
69An Overview of Homomorphic Encryption Alexander Lange Department of Computer Science Rochester Institute of Technology Rochester, NY 14623

An Overview of Homomorphic Encryption Alexander Lange Department of Computer Science Rochester Institute of Technology Rochester, NY 14623

Add to Reading List

Source URL: www.cs.rit.edu

Language: English - Date: 2011-05-15 17:17:55
70An Internet Voting System Supporting User Privacy Aggelos Kiayias University of Connecticut [removed]  Michael Korman

An Internet Voting System Supporting User Privacy Aggelos Kiayias University of Connecticut [removed] Michael Korman

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2006-12-20 13:09:28