Semantic security

Results: 252



#Item
231Security Challenges in Next Generation Cyber Physical Systems Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Zachary Ives, Insup Lee

Security Challenges in Next Generation Cyber Physical Systems Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Zachary Ives, Insup Lee

Add to Reading List

Source URL: www.researchgate.net

Language: English
232Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:57:44
233RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19.  How to Encrypt Properly with RSA

RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19. How to Encrypt Properly with RSA

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 16:53:41
234Journal of Cryptology, Volume 17, Number 2. Pages 81–104, Springer-Verlag, 2004.

Journal of Cryptology, Volume 17, Number 2. Pages 81–104, Springer-Verlag, 2004.

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2004-04-30 07:59:55
235Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.

Appears in SIAM J. of Computing, Vol. 32, No. 3, pp[removed], 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229, Springer-Verlag, 2001.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:14
236The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-25 00:57:52
237

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
238

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-04 02:57:54
239steal.dvi

steal.dvi

Add to Reading List

Source URL: csiflabs.cs.ucdavis.edu

Language: English - Date: 2012-07-13 18:43:54
240

PDF Document

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2004-02-08 14:54:12