Plaintext

Results: 367



#Item
1Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-01-10 04:13:59
    2Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

    Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2003-08-29 18:48:12
    3An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

    An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2007-08-20 03:23:28
    4Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

    Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-26 02:21:29
    5Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden   Abstract. Consider an electronic election scheme implemented using a

    Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

    Add to Reading List

    Source URL: www.nada.kth.se

    Language: English - Date: 2012-05-30 08:51:39
    6USBiTC-­‐SPD-­‐001	
  v0.6	
    	
   2014-­‐08-­‐29	
  

    USBiTC-­‐SPD-­‐001  v0.6     2014-­‐08-­‐29  

    Add to Reading List

    Source URL: www.commoncriteriaportal.org

    Language: English - Date: 2014-09-22 10:23:37
    7A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

    A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

    Add to Reading List

    Source URL: cs-www.cs.yale.edu

    Language: English - Date: 2001-10-24 10:54:04
    8Microsoft PowerPoint - ch5.ppt [相容模式]

    Microsoft PowerPoint - ch5.ppt [相容模式]

    Add to Reading List

    Source URL: people.cs.nctu.edu.tw

    Language: English - Date: 2012-08-25 21:38:28
    9Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

    Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

    Add to Reading List

    Source URL: www.wisdom.weizmann.ac.il

    Language: English - Date: 2006-01-05 12:45:55
    10D-OGS Newsletter – February 2013 News & Articles of Interest to Durham-Orange genealogists  PO Box 4703, Chapel Hill, NCdues – $President – Fred Mowry

    D-OGS Newsletter – February 2013 News & Articles of Interest to Durham-Orange genealogists PO Box 4703, Chapel Hill, NCdues – $President – Fred Mowry

    Add to Reading List

    Source URL: dogsnc.org

    Language: English - Date: 2014-02-25 04:22:14