Public-key cryptography

Results: 11378



#Item
841Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-03-17 15:01:03
842PATTERN-MATCHING SPI-CALCULUS∗ Christian Haack DePaul University Alan Jeffrey Bell Labs, Lucent Technologies

PATTERN-MATCHING SPI-CALCULUS∗ Christian Haack DePaul University Alan Jeffrey Bell Labs, Lucent Technologies

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:39:38
843Public-Key Cryptography Before 1985 Two public-key families emerged that were commercially viable: The Elliptic Curve Discrete Logarithm Problem: State of the Art

Public-Key Cryptography Before 1985 Two public-key families emerged that were commercially viable: The Elliptic Curve Discrete Logarithm Problem: State of the Art

Add to Reading List

Source URL: www.iwsec.org

Language: English - Date: 2008-12-18 21:11:06
    844Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman  Nicholas Hopper

    Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas Hopper

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2013-09-04 15:59:08
    845Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA  Micah Sherr

    Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA Micah Sherr

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2014-03-31 17:22:53
    846,1)1&$ &HUWLILFDWH3ROLF\DQG &HUWLILFDWLRQ3UDFWLFH 6WDWHPHQW Version 0.3 (DRAFT)

    ,1)1&$ &HUWLILFDWH3ROLF\DQG &HUWLILFDWLRQ3UDFWLFH 6WDWHPHQW Version 0.3 (DRAFT)

    Add to Reading List

    Source URL: security.fi.infn.it

    Language: English - Date: 2011-04-08 05:46:20
    847Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

    Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

    Add to Reading List

    Source URL: www.e7n.ch

    Language: English
    848Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK  Alan Jeffrey

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:36:15
    849Microsoft Word - CPS-2_0.doc

    Microsoft Word - CPS-2_0.doc

    Add to Reading List

    Source URL: security.fi.infn.it

    Language: English - Date: 2011-04-08 05:46:20
    850Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin Microsoft Research, Cambridge, UK {gdane,fournet,markulf,santiago}@microsoft.com

    Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin Microsoft Research, Cambridge, UK {gdane,fournet,markulf,santiago}@microsoft.com

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-11-04 03:36:30