Semantic security

Results: 252



#Item
171Cipher / Advantage / RSA / Semantic security / Probabilistic encryption / Schmidt–Samoa cryptosystem / Cryptography / Public-key cryptography / Chosen-ciphertext attack

Searchable Keyword-Based Encryption∗ Dong Jin Park† , Juyoung Cha‡ , and Pil Joong Lee‡ † Samsung Electronics Co., Ltd., Korea [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-01-21 22:15:55
172Cramer–Shoup cryptosystem / Malleability / Optimal asymmetric encryption padding / ElGamal encryption / Chosen-plaintext attack / RSA / Cipher / Adaptive chosen-ciphertext attack / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:56
173Homomorphic encryption / Electronic commerce / Ciphertext indistinguishability / Secure multi-party computation / Secret sharing / Cipher / RSA / ElGamal encryption / Semantic security / Cryptography / Public-key cryptography / Cryptographic protocols

Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption Adriana L´opez-Alt New York University Eran Tromer∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-07 16:19:48
174Software quality / Software testing / Computer network security / Program analysis / Hacking / Vulnerability / Application security / Static program analysis / Buffer overflow / Cyberwarfare / Software bugs / Computer security

Kestrel Technology The Next Generation Tool for Static Code Analysis: Proving the Absence of Critical Vulnerabilities in C Source Code The Company Kestrel Technology (KT) specializes in sound semantic static analysis wit

Add to Reading List

Source URL: www.kestreltechnology.com

Language: English - Date: 2014-09-26 13:23:09
175Initialization vector / Advantage / Cipher / Semantic security / Encryption / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Block cipher

Securing Cloud Data in the New Attacker Model 2 ˇ Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof Lichota3 , Srdjan Capkun 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:18:08
176RSA / Ciphertext / Advantage / Cipher / Key / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Deterministic encryption

A Punctured Programming Approach to Adaptively Secure Functional Encryption Brent Waters∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 10:44:19
177Semantic security / Block cipher modes of operation / Advantage / Key Wrap / Cipher / Probabilistic encryption / Optimal asymmetric encryption padding / Cryptography / Authenticated encryption / Initialization vector

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:59:46
178National security / Data management / Public safety / Surveillance / Situation awareness / Metadata / Security / Crime prevention / Law enforcement

Surveillance, Events, Semantic Web

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-21 14:22:43
179World Wide Web Consortium / RDF / Web Ontology Language / Multilevel security / Transmission Control Protocol / Internet protocol suite / PCI Express / Computing / Semantic Web / Web standards

OWL[removed]Owl Computing Technologies R

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2013-03-25 15:04:53
180Internet protocols / Internet standards / RDF / Semantic Web / Web Ontology Language / Multilevel security / Operating system / Syslog / Solaris / Computing / Internet / Web standards

ORMS Owl Computing Technologies R

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2012-03-05 10:58:19
UPDATE