Probabilistic encryption

Results: 76



#Item
11The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
12Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher  Simon Duquennoy

Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

Add to Reading List

Source URL: www.vs.inf.ethz.ch

Language: English - Date: 2015-09-17 04:43:33
13or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Explicit Randomness is not Necessary when Modeling Probabilistic Encryption 1 V´eronique Cortier Heinrich H¨ordegen Bogdan Warins

or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Explicit Randomness is not Necessary when Modeling Probabilistic Encryption 1 V´eronique Cortier Heinrich H¨ordegen Bogdan Warins

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2007-01-12 11:55:22
    14Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury  Deepak Garg

    Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-02-12 12:31:57
    15Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

    Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:35:45
    16Benaloh’s Dense Probabilistic Encryption Revisited ? Laurent Fousse1 , Pascal Lafourcade2 , and Mohamed Alnuaimi3 1  3

    Benaloh’s Dense Probabilistic Encryption Revisited ? Laurent Fousse1 , Pascal Lafourcade2 , and Mohamed Alnuaimi3 1 3

    Add to Reading List

    Source URL: www.lsv.ens-cachan.fr

    Language: English - Date: 2012-12-05 06:09:37
      17Microsoft Word - nljul2005_2_.doc

      Microsoft Word - nljul2005_2_.doc

      Add to Reading List

      Source URL: www.barc.gov.in

      Language: English - Date: 2012-08-10 06:17:36
      18BRICS  Basic Research in Computer Science BRICS RS-00-5 Damg˚ard & Jurik: Efficient Protocols based on Probabilistic Encryption

      BRICS Basic Research in Computer Science BRICS RS-00-5 Damg˚ard & Jurik: Efficient Protocols based on Probabilistic Encryption

      Add to Reading List

      Source URL: www.brics.dk

      Language: English - Date: 2000-03-10 05:29:11
        19Security II: Cryptography Markus Kuhn Computer Laboratory  Lent 2012 – Part II

        Security II: Cryptography Markus Kuhn Computer Laboratory Lent 2012 – Part II

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2013-04-25 09:16:13
        20CS276 Cryptography  Spring 2006 Lecture 19: Lecturer: David Wagner

        CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

        Add to Reading List

        Source URL: www.cs.berkeley.edu

        Language: English - Date: 2015-01-21 19:48:43