Deterministic encryption

Results: 55



#Item
21Cryptography / Internet search / Deterministic encryption / Nearest neighbor search / Search engine indexing / Database / Web search query / ANts P2P / Information science / Information retrieval / Searching

Usable Secure Private Search Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin and Salvatore J. Stolfo Department of Computer Science Columbia University New York NY, 10027, USA

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:34
22Homomorphic encryption / Paillier cryptosystem / Deterministic encryption / HTTP Secure / ElGamal encryption / Encryption software / RSA / Cryptography / Public-key cryptography / Cryptographic software

AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
23Encryption / Homomorphic encryption / Cipher / Science / Knowledge / Ethology / Cryptography / Deterministic encryption / Ciphertext

Köhler et al. Journal of Cloud Computing: Advances, Systems and Applications:1 DOIs13677RESEARCH

Add to Reading List

Source URL: www.journalofcloudcomputing.com

Language: English
24RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Cipher / Advantage / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:52:37
25Knowledge / Aquaculture / Mathematical modeling / Systems science / Fish farming / Advanced Encryption Standard / Deterministic simulation / Conceptual model / Systems modeling / Science / Scientific modeling / Ethology

AES News, Spring 1999, Vol. 2, No. 2 Letter From

Add to Reading List

Source URL: media.dhweb.com.s3.amazonaws.com

Language: English - Date: 2012-12-21 15:03:59
26RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:51:10
27Cryptography / Deterministic encryption / Search engine indexing / Extensible Storage Engine / Internet protocols / Information science / Information retrieval / Information

Practical Dynamic Searchable Encryption with Small Leakage Emil Stefanov Charalampos Papamanthou

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-08 19:43:06
28Ciphertext indistinguishability / Public-key cryptography / Encryption / VMAC / Digital signature / Deterministic encryption / Advantage / Cipher / Galois/Counter Mode / Cryptography / Authenticated encryption / Message authentication code

Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:25:35
29Semantic security / Deterministic encryption / RSA / ElGamal encryption / Advantage / Cipher / Ciphertext indistinguishability / Plaintext-aware encryption / Cryptography / Public-key cryptography / Electronic commerce

Message-Locked Encryption for Lock-Dependent Messages Mart´ın Abadi1,3 , Dan Boneh2,? , Ilya Mironov1 , Ananth Raghunathan2,?,?? , and Gil Segev2,?,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 11:56:24
30Deterministic encryption / Mathematical sciences / Science / Ciphertext indistinguishability / Cryptography / Advantage / Ciphertext

CS255: Introduction to Cryptography Winter 2015 Assignment #1: Solutions Problem 0. Let m0 be the message attack at dawn and m1 be the message attack at dusk, and let

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-12 00:12:50
UPDATE