1![Benaloh’s Dense Probabilistic Encryption Revisited Laurent Fousse 1 Pascal Lafourcade2 Mohamed Alnuaimi3 Benaloh’s Dense Probabilistic Encryption Revisited Laurent Fousse 1 Pascal Lafourcade2 Mohamed Alnuaimi3](https://www.pdfsearch.io/img/e974ca10ee9f4a3492fe30a5f7ef6142.jpg) | Add to Reading ListSource URL: log.lateralis.orgLanguage: English - Date: 2017-10-30 10:33:27
|
---|
2![Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway](https://www.pdfsearch.io/img/cbefde28d71a2838517196ef8ae036ee.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2003-08-29 18:48:12
|
---|
3![An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En](https://www.pdfsearch.io/img/9c4674acfbf90a35abd5f496e03dbdd1.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2007-08-20 03:23:28
|
---|
4![A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA](https://www.pdfsearch.io/img/421d28920e0329cf65afae78078d0d82.jpg) | Add to Reading ListSource URL: cs-www.cs.yale.eduLanguage: English - Date: 2001-10-24 10:54:04
|
---|
5![Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg () May 21, 2013 Practical Solutions for Format Preserving Encryption Authors: Mor Weiss, Boris Rozenberg, and Muhammad Barham Presented by Boris Rozenberg () May 21, 2013](https://www.pdfsearch.io/img/a20915ac771f34f11cf08acc364e0c2b.jpg) | Add to Reading ListSource URL: ieee-security.orgLanguage: English - Date: 2015-05-11 00:33:15
|
---|
6![Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1 Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1](https://www.pdfsearch.io/img/aa06a40835b36c887d3680e2afcf0d8f.jpg) | Add to Reading ListSource URL: www.wisdom.weizmann.ac.ilLanguage: English - Date: 2006-01-05 12:45:55
|
---|
7![Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e](https://www.pdfsearch.io/img/5bb8690194b2c7546b5088b9090ea02c.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-08-24 18:12:50
|
---|
8![Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e](https://www.pdfsearch.io/img/34026531082ea6c59ffc51ab672b31a5.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-08-24 18:12:50
|
---|
9![Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay, Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,](https://www.pdfsearch.io/img/420646748fc72dd647a10101f2648005.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2016-05-02 04:08:26
|
---|
10![Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg](https://www.pdfsearch.io/img/4e0e5abad1e2b63aa01d0dfaeab87df6.jpg) | Add to Reading ListSource URL: www.andrew.cmu.eduLanguage: English - Date: 2016-01-24 20:37:43
|
---|