Semantic security

Results: 252



#Item
61Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
62Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-05-05 15:39:42
63Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
64Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 04:10:40
65Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 14:22:01
66A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
67Semantic Security and Indistinguishability in the Quantum World April 20, 2015 Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4

Semantic Security and Indistinguishability in the Quantum World April 20, 2015 Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 15:29:56
68An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley and William M. Fitzgerald Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland s.foley

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley and William M. Fitzgerald Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland s.foley

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2009-07-27 08:02:51
69Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs†  April 29, 2015

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
70Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1  Colin Boyd3

Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1 Colin Boyd3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 00:49:04