First Page | Document Content | |
---|---|---|
Date: 2017-02-03 04:27:06Cryptography Public-key cryptography Homeomorphisms Homomorphic encryption Proxy re-encryption Malleability Message authentication code Paillier cryptosystem RSA Digital signature | This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. HomomorphicAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 478,12 KBShare Document on Facebook |
How to Configure Identical Credentials Configuration GuideDocID: 1rlsV - View Document | |
Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2DocID: 1qZv0 - View Document | |
FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.DocID: 1qHZI - View Document | |
Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016DocID: 1q5Q3 - View Document | |
Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)DocID: 1q44R - View Document |