Back to Results
First PageMeta Content
Homomorphic encryption / Applied mathematics / Deterministic encryption / Paillier cryptosystem / Public-key cryptography / Cipher / Encryption / Authenticated encryption / Proxy re-encryption / Cryptography / Cyberwarfare / Security


Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1
Add to Reading List

Open Document

File Size: 65,70 KB

Share Result on Facebook

Company

Amazon / Facebook / /

IndustryTerm

storage infrastructure / encrypted query processing / search function / web applications / Secure web applications / computing / trusted computing base / little complex processing / keyword search / /

Organization

MIT / /

Person

Emily Stark / Ada Popa / /

Position

programmer / administrator / /

ProgrammingLanguage

Haskell / SQL / /

Technology

encryption / functional programming / encryption system / cryptography / order-preserving encryption / Orderpreserving symmetric encryption / /

SocialTag