Probabilistic encryption

Results: 76



#Item
41Predicate Encryption for Circuits from LWE Sergey Gorbunov∗ MIT Vinod Vaikuntanathan† MIT

Predicate Encryption for Circuits from LWE Sergey Gorbunov∗ MIT Vinod Vaikuntanathan† MIT

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 11:54:01
42Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-12 09:31:48
43Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski∗ Gil Segev†

Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-24 01:51:53
44Searchable Keyword-Based Encryption∗ Dong Jin Park† , Juyoung Cha‡ , and Pil Joong Lee‡ † Samsung Electronics Co., Ltd., Korea [removed]

Searchable Keyword-Based Encryption∗ Dong Jin Park† , Juyoung Cha‡ , and Pil Joong Lee‡ † Samsung Electronics Co., Ltd., Korea [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-01-21 22:15:55
45C:/Documents and Settings/msah010/Desktop/THESIS/important!!/thesis.dvi

C:/Documents and Settings/msah010/Desktop/THESIS/important!!/thesis.dvi

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-09-24 07:55:50
46Securing Cloud Data in the New Attacker Model 2 ˇ Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof Lichota3 , Srdjan Capkun 1

Securing Cloud Data in the New Attacker Model 2 ˇ Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof Lichota3 , Srdjan Capkun 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:18:08
47NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:07:21
48An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:59:46
49Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond Shafi Goldwasser? Yael Kalai† Raluca Ada Popa? Vinod Vaikuntanathan./

Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond Shafi Goldwasser? Yael Kalai† Raluca Ada Popa? Vinod Vaikuntanathan./

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
50Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:15:30