Probabilistic encryption

Results: 76



#Item
51Initialization vector / Probabilistic encryption / Ciphertext indistinguishability / Deterministic encryption / RSA / Disk encryption theory / Block cipher / Cipher / MapReduce / Cryptography / Homomorphic encryption / Paillier cryptosystem

MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani Rupak Majumdar

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2013-07-29 19:36:50
52Linear algebra / Symbol / Trace

or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Explicit Randomness is not Necessary when Modeling Probabilistic Encryption 1 V´eronique Cortier Heinrich H¨ordegen Bogdan Warins

Add to Reading List

Source URL: 78.47.219.106

Language: English - Date: 2014-05-19 07:36:07
53Ciphertext indistinguishability / McEliece cryptosystem / Adaptive chosen-ciphertext attack / Semantic security / Optimal asymmetric encryption padding / Probabilistic encryption / Post-quantum cryptography / RSA / Paillier cryptosystem / Cryptography / Public-key cryptography / Niederreiter cryptosystem

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks[removed]Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: [removed]sec.274 RESEARCH ARTICLE

Add to Reading List

Source URL: bbcr.uwaterloo.ca

Language: English - Date: 2011-07-16 17:53:26
54Homomorphic encryption / Paillier cryptosystem / Malleability / ElGamal encryption / Probabilistic encryption / Goldwasser–Micali cryptosystem / Ciphertext indistinguishability / Semantic security / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

A Survey of Homomorphic Encryption for Nonspecialists

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2012-02-01 11:05:22
55Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / Malleability / Random oracle / Mihir Bellare / Semantic security / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
56Information society / Homomorphic encryption / Probabilistic encryption / Proxy re-encryption / ElGamal encryption / Ciphertext / Blind signature / RSA / Prêt à Voter / Cryptography / Public-key cryptography / Electronic voting

Chapter 69 Verifiable Voting Systems Thea Peacock1 , Peter Y. A. Ryan1 , Steve Schneider2 and Zhe Xia2 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
57CBC-MAC / Padding / Ciphertext / Hash function / Probabilistic encryption / One-way compression function / Cryptography / Block cipher modes of operation / Message authentication codes

CS255: Cryptography and Computer Security Winter 2012 Assignment #2 Due: 5pm Friday, Feb. 17, 2012.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-02-09 13:04:29
58Key / Symmetric-key algorithm / Probabilistic encryption / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

RZ 3628 (# [removed]Computer Science 16 pages

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-06-29 07:25:33
59Digital signature / Key / Cryptographic hash function / Probabilistic encryption / Message authentication code / Symmetric-key algorithm / RSA / ID-based encryption / Signcryption / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
60Block cipher modes of operation / Watermarking attack / Block cipher / Ciphertext / RSA / Advanced Encryption Standard / Probabilistic encryption / Disk encryption theory / Cryptography / Disk encryption / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2009

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-03-10 01:08:56
UPDATE