RSA

Results: 5605



#Item
371Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:57
372

A Clean-Slate Look at Disk Scrubbing Alina Oprea RSA Laboratories Cambridge, MA

Add to Reading List

Source URL: www.arijuels.com

Language: English - Date: 2013-09-23 12:47:35
    373

    Proactive RSA Signatures with Non-Interactive Signing Stanislaw Jarecki and Josh Olsen School of Information and Computer Science

    Add to Reading List

    Source URL: fc08.ifca.ai

    Language: English - Date: 2008-05-08 09:53:37
      374Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

      Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

      Add to Reading List

      Source URL: www.dgalindo.es

      Language: English - Date: 2007-11-26 10:35:45
      375Cryptography / International Cryptology Conference / Secure multi-party computation / RSA

      Crypto connections … and dividing a pie Rump Session of the Workshop on T&P of SMPC (May 08, 2014 – Aarhus, Denmark)

      Add to Reading List

      Source URL: cfem.au.dk

      Language: English - Date: 2015-08-24 07:02:25
      376

      ATP WORLD TOUR SINGLES: ACTIVE PLAYERS DELRAY BEACH RESULTS PLAYER Anderson, Kevin (RSA) Bachinger, Matthias (GER) Baghdatis, Marcos (CYP) Berrer, Michael (GER)

      Add to Reading List

      Source URL: www.yellowtennisball.com

      Language: English - Date: 2015-06-25 13:47:57
        377

        RFID PRIVACY: A TECHNICAL PRIMER FOR THE NON-TECHNICAL READER DRAFT: 23 FEBRUARY 2005 Ari Juels RSA Laboratories

        Add to Reading List

        Source URL: www.arijuels.com

        Language: English - Date: 2013-09-24 11:25:30
          378

          Access to Public Records under New Hampshire’s RSA 91-A August 22, 2014 Wadleigh, Starr & Peters, P.L.L.C. Serving New Hampshire since 1899

          Add to Reading List

          Source URL: www.wadleighlaw.com

          Language: English - Date: 2015-02-09 00:49:43
            379

            Report2Web Report Application RSA Login Request Form TPH Organization Name: First and Last Name of User Requiring Report2Web Access: User Email Address:

            Add to Reading List

            Source URL: www.cboe.org

            Language: English - Date: 2015-09-03 10:29:38
              380

              Published in Designs, Codes and Cryptography, 59(1/3):169–182, How (Not) to Design Strong-RSA Signatures Marc Joye Abstract This paper considers strong-RSA signature schemes built from the scheme of

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-09-04 19:43:50
                UPDATE