Back to Results
First PageMeta Content
Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption


Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg
Add to Reading List

Document Date: 2016-01-24 20:37:43


Open Document

File Size: 360,94 KB

Share Result on Facebook