Semantic security

Results: 252



#Item
11Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 12:09:54
12Cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Semantic security / Cryptosystem / RSA / Data Encryption Standard

LNCSHow to Shuffle in Public

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:49:44
13Computing / Information technology / Software / Data modeling / Data security / Splunk / System administration / Data analysis / Latent semantic analysis / Column / Visualization / Database

Building Blocks for Exploratory Data Analysis Tools Sara Alspaugh Archana Ganapathi UC Berkeley

Add to Reading List

Source URL: poloclub.gatech.edu

Language: English - Date: 2013-07-08 06:01:43
14Software / Computing / Computer architecture / Compilers / Instruction set architectures / Programming language implementation / Machine code / GNU Compiler Collection / X86 / Assembly language / LLVM / NOP

SACK: a Semantic Automated Compiler Kit Colby T. Skeggs Applications o Rapid architecture testing o Automatically-generated architectures: o For security

Add to Reading List

Source URL: www.celskeggs.com

Language: English
15Computational linguistics / Linguistics / Applied linguistics / Computer security / Cryptography / Word-sense disambiguation / Password / Security / Part-of-speech tagging / WordNet / Natural language processing / Dictionary attack

On the Semantic Patterns of Passwords and their Security Impact Rafael Veras, Christopher Collins, and Julie Thorpe University of Ontario Institute of Technology Ontario, Canada {rafael.verasguimaraes, christopher.collin

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
16Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Malleability / CramerShoup cryptosystem / Semantic security / Plaintext-aware encryption / ElGamal encryption / Cryptosystem / RSA / Random oracle

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:51:39
17Cryptography / Pseudorandomness / Advantage / Semantic security / Negligible function / Provable security / Concrete security / Pseudorandom permutation / Pseudorandom generator theorem / Pseudorandom generator / Ciphertext indistinguishability / Block cipher

On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2005-06-19 20:47:33
18Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:54:04
19Semantic Web / Computer security / Access control / Security / Computing / Ontology / Knowledge engineering / Computer access control / Role-based access control / Description logic / Web Ontology Language / Lightweight ontology

PhD Dissertation International Doctorate School in Information and Communication Technologies DIT - University of Trento

Add to Reading List

Source URL: disi.unitn.it

Language: English - Date: 2014-09-10 09:40:14
20Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack

Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2006-01-05 12:45:55
UPDATE