Trapdoor

Results: 111



#Item
11On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates Extended Abstract Yael Gertner 

On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates Extended Abstract Yael Gertner 

Add to Reading List

Source URL: omereingold.files.wordpress.com

Language: English - Date: 2014-10-21 19:46:22
    12TCHo: A Hardware-Oriented Trapdoor Cipher Jean-Philippe Aumasson1, , Matthieu Finiasz2 , Willi Meier1, , and Serge Vaudenay3 1  FHNW, Windisch, Switzerland

    TCHo: A Hardware-Oriented Trapdoor Cipher Jean-Philippe Aumasson1, , Matthieu Finiasz2 , Willi Meier1, , and Serge Vaudenay3 1 FHNW, Windisch, Switzerland

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:45
      13TCHo: a hardware-oriented trapdoor cipher Jean-Philippe Aumasson Matthieu Finiasz, Willi Meier, Serge Vaudenay 1/1

      TCHo: a hardware-oriented trapdoor cipher Jean-Philippe Aumasson Matthieu Finiasz, Willi Meier, Serge Vaudenay 1/1

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:47:11
        14All-But-Many Lossy Trapdoor Functions Dennis Hofheinz∗ December 30, 2011 Abstract We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many

        All-But-Many Lossy Trapdoor Functions Dennis Hofheinz∗ December 30, 2011 Abstract We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many

        Add to Reading List

        Source URL: www.kjdf.de

        Language: English - Date: 2014-06-10 05:37:34
          15How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin∗ Sara Krehbiel†

          How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin∗ Sara Krehbiel†

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2013-06-26 10:52:03
            16Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu  Abstract. Asymmetric searchable en

            Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en

            Add to Reading List

            Source URL: imm.dtu.dk

            Language: English - Date: 2014-03-13 15:47:35
              17A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1

              A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1

              Add to Reading List

              Source URL: www.dgalindo.es

              Language: English - Date: 2007-11-26 10:35:53
              18How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin∗ Sara Krehbiel†

              How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin∗ Sara Krehbiel†

              Add to Reading List

              Source URL: web.eecs.umich.edu

              Language: English - Date: 2015-09-08 16:31:59
                19Identity Based (Lossy) Trapdoor Functions and Applications

                Identity Based (Lossy) Trapdoor Functions and Applications

                Add to Reading List

                Source URL: web.eecs.umich.edu

                Language: English - Date: 2015-09-08 16:32:09
                  20Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu  Abstract. Asymmetric searchable en

                  Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en

                  Add to Reading List

                  Source URL: www2.imm.dtu.dk

                  Language: English - Date: 2014-03-13 15:47:35