Probabilistic encryption

Results: 76



#Item
11Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
12Cryptography / Homomorphic encryption / Paillier cryptosystem / Probabilistic encryption / Block cipher / Encryption / Ciphertext indistinguishability / Cloud computing security / Blowfish / ElGamal encryption / GoldwasserMicali cryptosystem / Initialization vector

Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

Add to Reading List

Source URL: www.vs.inf.ethz.ch

Language: English - Date: 2015-09-17 04:43:33
13

or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Explicit Randomness is not Necessary when Modeling Probabilistic Encryption 1 V´eronique Cortier Heinrich H¨ordegen Bogdan Warins

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2007-01-12 11:55:22
    14Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

    Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-02-12 12:31:57
    15Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

    Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:35:45
    16

    Benaloh’s Dense Probabilistic Encryption Revisited ? Laurent Fousse1 , Pascal Lafourcade2 , and Mohamed Alnuaimi3 1 3

    Add to Reading List

    Source URL: www.lsv.ens-cachan.fr

    Language: English - Date: 2012-12-05 06:09:37
      17Dynamical system / Logistic map / Cipher / Public-key cryptography / Integrated Encryption Scheme / Key / Butterfly effect / Index of cryptography articles / Probabilistic encryption / Cryptography / Chaos theory / Lorenz attractor

      Microsoft Word - nljul2005_2_.doc

      Add to Reading List

      Source URL: www.barc.gov.in

      Language: English - Date: 2012-08-10 06:17:36
      18

      BRICS Basic Research in Computer Science BRICS RS-00-5 Damg˚ard & Jurik: Efficient Protocols based on Probabilistic Encryption

      Add to Reading List

      Source URL: www.brics.dk

      Language: English - Date: 2000-03-10 05:29:11
        19Advantage / RSA / One-time pad / Ciphertext / Probabilistic encryption / Blum–Goldwasser cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

        Security II: Cryptography Markus Kuhn Computer Laboratory Lent 2012 – Part II

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2013-04-25 09:16:13
        20Search algorithms / Ciphertext indistinguishability / Random oracle / Advantage / Hash function / ElGamal encryption / One-way function / Optimal asymmetric encryption padding / Probabilistic encryption / Cryptography / Cryptographic hash functions / Hashing

        CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

        Add to Reading List

        Source URL: www.cs.berkeley.edu

        Language: English - Date: 2015-01-21 19:48:43
        UPDATE