1![Incremental Deterministic Public-Key Encryption Ilya Mironov∗ Omkant Pandey† Omer Reingold∗ Incremental Deterministic Public-Key Encryption Ilya Mironov∗ Omkant Pandey† Omer Reingold∗](https://www.pdfsearch.io/img/c5285be67726496f2f58bf5c4ba4ab65.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2012-01-30 19:12:55
|
---|
2![Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev† Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†](https://www.pdfsearch.io/img/6c81ab49f034aaab6ea15ded93654214.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2012-11-29 11:47:05
|
---|
3![Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev† Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†](https://www.pdfsearch.io/img/757dddf28d15fe548be2cb6198b230cb.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-01-10 04:13:59
|
---|
4![Appears in Advances in Cryptology – CRYPTOHow to Encipher Messages on a Small Domain Deterministic Encryption and the Thorp Shuffle Ben Morris1 , Phillip Rogaway2 , and Till Stegers2 1 Appears in Advances in Cryptology – CRYPTOHow to Encipher Messages on a Small Domain Deterministic Encryption and the Thorp Shuffle Ben Morris1 , Phillip Rogaway2 , and Till Stegers2 1](https://www.pdfsearch.io/img/2e8c431b67435f2f4b2df636a532326f.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.edu- Date: 2009-09-20 01:41:31
|
---|
5![An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En](https://www.pdfsearch.io/img/9c4674acfbf90a35abd5f496e03dbdd1.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2007-08-20 03:23:28
|
---|
6![The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway](https://www.pdfsearch.io/img/896841aaa8151a181d4e7d22de5fbaa6.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2007-08-20 03:22:52
|
---|
7![Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg () May 21, 2013 Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg () May 21, 2013](https://www.pdfsearch.io/img/a20915ac771f34f11cf08acc364e0c2b.jpg) | Add to Reading ListSource URL: ieee-security.orgLanguage: English - Date: 2015-05-11 00:33:15
|
---|
8![Leakage-Abuse Attacks against Searchable Encryption David Cash Paul Grubbs Leakage-Abuse Attacks against Searchable Encryption David Cash Paul Grubbs](https://www.pdfsearch.io/img/03848b5724e818e0c15ee82b8735872b.jpg) | Add to Reading ListSource URL: paul.rutgers.eduLanguage: English - Date: 2015-10-27 14:52:24
|
---|
9![Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e](https://www.pdfsearch.io/img/5bb8690194b2c7546b5088b9090ea02c.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-08-24 18:12:50
|
---|
10![Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e](https://www.pdfsearch.io/img/34026531082ea6c59ffc51ab672b31a5.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-08-24 18:12:50
|
---|