Plaintext-aware encryption

Results: 31



#Item
1Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden   Abstract. Consider an electronic election scheme implemented using a

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:51:39
2U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
3An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:52:37
4An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:51:10
5Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1  Vincenzo Iovino2

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-06 07:23:00
6Message-Locked Encryption for Lock-Dependent Messages Mart´ın Abadi1,3 , Dan Boneh2,? , Ilya Mironov1 , Ananth Raghunathan2,?,?? , and Gil Segev2,?,?? 1

Message-Locked Encryption for Lock-Dependent Messages Mart´ın Abadi1,3 , Dan Boneh2,? , Ilya Mironov1 , Ananth Raghunathan2,?,?? , and Gil Segev2,?,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 11:56:24
7Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1  Department of Information Engineering, Chinese University of Hong Ko

Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1 Department of Information Engineering, Chinese University of Hong Ko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-20 00:58:24
8Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard∗ August 18, 2006  Keywords: Blockwise-Adaptive Attack, Encryption Schemes, Chosen-Plaintext

Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard∗ August 18, 2006 Keywords: Blockwise-Adaptive Attack, Encryption Schemes, Chosen-Plaintext

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-17 21:22:01
9Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2011, Article ID[removed], 12 pages doi:[removed][removed]Research Article

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-08-28 20:56:39
10Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54