Semantic security

Results: 252



#Item
41Resources / Semantic Web / World Wide Web / ORCA / Access control / Representational state transfer / Uniform resource locator / Server / Computing / Technology / Security

A Retrospective on ORCA: Open Resource Control Architecture 1 Jeff Chase and Ilya Baldin

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 2014-12-19 16:15:30
42Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-02-21 12:47:44
43RSA / Ciphertext / Key / Randomness extractor / Symmetric-key algorithm / Semantic security / Cryptography / Key management / Ciphertext indistinguishability

Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay∗ Adriana L´opez-Alt† Hoeteck Wee‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-12-09 09:25:45
44

A Framework for Modeling Decision Making and Deception with Semantic Information

Add to Reading List

Source URL: ieee-security.org

- Date: 2012-06-05 18:19:02
    45

    Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

    Add to Reading List

    Source URL: imi.kyushu-u.ac.jp

    - Date: 2007-06-02 00:48:30
      46

      Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers

      Add to Reading List

      Source URL: www.ieee-security.org

      - Date: 2012-06-05 18:19:24
        47

        Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2012-06-05 18:18:54
          48

          Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

          Add to Reading List

          Source URL: imi.kyushu-u.ac.jp

          Language: English - Date: 2007-03-14 18:37:42
            49

            Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2012-06-05 18:19:24
              50

              Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2012-05-22 01:36:04
                UPDATE