Back to Results
First PageMeta Content
Authenticated encryption / Chosen-ciphertext attack / RSA / Semantic security / Advantage / Crypt / Cryptography / Deterministic encryption / Ciphertext


DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi
Add to Reading List

Document Date: 2013-07-02 21:51:23


Open Document

File Size: 243,19 KB

Share Result on Facebook

Company

AES / SS / Amazon / The Dupless / Mozy / Dropbox / Google / Vf / NetApp / Intel / /

Currency

pence / /

Event

FDA Phase / /

Facility

San Diego University of Wisconsin / Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi Thomas Ristenpart University of California / San Diego University of California / To store / /

IndustryTerm

online attacks / malicious server / synchronization applications / file search / availability auditing / loaded server / client algorithms / online brute-force attack / web interface / filename search / deterministic algorithms / tag generation algorithm / web servers / client-toKS protocol / secure protocol / evaluation protocol / online and offline attacks / latency solution / computing / backup solutions / Web-Server / /

OperatingSystem

DOS / /

Organization

University of California / San Diego University / University of Wisconsin / /

Person

Max Min Mean / Kdae / /

Product

Pentax K-x Digital Camera / EncPath / Apache 2.0 / KS / OPRFv1 / OPRFv2 / KS drops / /

ProgrammingLanguage

Python / K / /

ProvinceOrState

Kansas / Wisconsin / Nova Scotia / California / /

Technology

client algorithms / virtual machine / deterministic authenticated encryption / client-toKS protocol / filename encryption / tag generation algorithm / RSA-OPRF protocol / API / PKI / KS protocol / two protocols / secret key / UDP / RSA OPRF protocol / oblivious PRF protocol / Encryption / evaluation protocol / OPRF protocol / public key / deterministic Message-Locked Encryption / Message-locked encryption / i7-970 processor / Madison Abstract encryption / HTTP / caching / OPRFv2 protocol / secure protocol / non-dedupable encryption / KS protocols / authenticated encryption / format-preserving encryption / five algorithms / /

SocialTag