Semantic security

Results: 252



#Item
31A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-17 07:57:12
32Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†

Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-02 12:48:47
33Using Future Internet Technologies to Strengthen Criminal Justice

Using Future Internet Technologies to Strengthen Criminal Justice

Add to Reading List

Source URL: www.rand.org

Language: English - Date: 2015-08-18 13:47:36
34Semantic Security and Indistinguishability in the Quantum World (extended abstract of arXiv:for QCRYPTTommaso Gagliardoni∗, Andreas H¨ ulsing†, and Christian Schaffner‡

Semantic Security and Indistinguishability in the Quantum World (extended abstract of arXiv:for QCRYPTTommaso Gagliardoni∗, Andreas H¨ ulsing†, and Christian Schaffner‡

Add to Reading List

Source URL: 2015.qcrypt.net

Language: English - Date: 2015-09-22 01:45:35
    352013 Eleventh Annual Conference on Privacy, Security and Trust (PST)  A Self-Adaptive Classification for the Dissociating Privacy Agent Marc Ju´arez

    2013 Eleventh Annual Conference on Privacy, Security and Trust (PST) A Self-Adaptive Classification for the Dissociating Privacy Agent Marc Ju´arez

    Add to Reading List

    Source URL: securehomes.esat.kuleuven.be

    Language: English - Date: 2013-10-31 05:40:46
    36Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

    Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2009-03-17 15:01:03
    37

    PDF Document

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-16 06:52:57
    38main_CameraReadyFormatting.dvi

    main_CameraReadyFormatting.dvi

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2012-05-14 19:11:08
    39CS255: Introduction to Cryptography  Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

    CS255: Introduction to Cryptography Winter 2015 Assignment #2: Solutions Problem 1. (a) Suppose we can find two message/hash pairs hM1 , h(M1 )i and hM2 , h(M2 )i such that

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-03-01 19:29:53