11![Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message](https://www.pdfsearch.io/img/2dd331720b0da2406ce939c4f41b5498.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-28 01:59:26
|
---|
12![Microsoft WordA Secure Scheme for Authenticated Encryprion.doc Microsoft WordA Secure Scheme for Authenticated Encryprion.doc](https://www.pdfsearch.io/img/5a63de499a72dcebb325bebf8ad2fa53.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-12-12 07:11:04
|
---|
13![One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010 One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010](https://www.pdfsearch.io/img/d091a7b449ce7d0f0c26db42e95223d4.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-22 12:08:05
|
---|
14![Version 0.3 Axantum Strong Software Licensing Svante Seleborg Axantum Software AB [removed] Version 0.3 Axantum Strong Software Licensing Svante Seleborg Axantum Software AB [removed]](https://www.pdfsearch.io/img/a2c3ecf651dabd59669235a663c87300.jpg) | Add to Reading ListSource URL: www.axantum.comLanguage: English - Date: 2014-05-04 18:08:46
|
---|
15![Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1 Centre for Computer and Information Security Research Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1 Centre for Computer and Information Security Research](https://www.pdfsearch.io/img/2aad19823fe54f6f1ad0bf2ae8c63a23.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-04-20 21:27:06
|
---|
16![Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed] Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]](https://www.pdfsearch.io/img/cf7a3690c3e0ac7adab354a383c96b74.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-06-24 08:19:14
|
---|
17![A preliminary version of this paper appears in the proceedings of Eurocrypt[removed]This is the full version, which appears as IACR ePrint Archive Record[removed]Key-Versatile Signatures and Applications: RKA, KDM and Jo A preliminary version of this paper appears in the proceedings of Eurocrypt[removed]This is the full version, which appears as IACR ePrint Archive Record[removed]Key-Versatile Signatures and Applications: RKA, KDM and Jo](https://www.pdfsearch.io/img/90f26f34d2030118cc07476887d5a41c.jpg) | Add to Reading ListSource URL: www0.cs.ucl.ac.ukLanguage: English - Date: 2014-09-03 04:47:43
|
---|
18![The most basic requirement is to encrypt FTI during transmission Information systems that receive, process, store, or transmit FTI, must: a. Protect the confidentiality and integrity of transmitted information. b. Imple
The most basic requirement is to encrypt FTI during transmission Information systems that receive, process, store, or transmit FTI, must: a. Protect the confidentiality and integrity of transmitted information. b. Imple](https://www.pdfsearch.io/img/8177d948ffe8e7602e58f8cc48d5e293.jpg) | Add to Reading ListSource URL: www.taxadmin.orgLanguage: English - Date: 2014-10-16 15:56:57
|
---|
19![Universally Composable Secure Group Communication Youliang Tian1,2 and Changgen Peng1,2 1 2 Universally Composable Secure Group Communication Youliang Tian1,2 and Changgen Peng1,2 1 2](https://www.pdfsearch.io/img/a967ebb3ecddd43dca2d2d7d135f9f39.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-08-28 03:00:32
|
---|
20![Cryptographic Hash Workshop Cryptographic Hash Workshop](https://www.pdfsearch.io/img/6f6025aed9413d8218c4d1ee2c74b217.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 11:29:14
|
---|