- Home
- » Tags
- » Deterministic encryption
Top View
- RSA Asymmetric Cryptosystem Beyond Homogeneous Transformation
- Chris Peikert – Research Statement
- Deterministic and Efficiently Searchable Encryption
- Deterministic Encryption: Definitional Equivalences and Constructions Without Random Oracles
- Deterministic Encryption: Definitional Equivalences and Constructions Without Random Oracles
- On Notions of Security for Deterministic Encryption, and Efficient Constructions Without Random Oracles
- Deterministic and Efficiently Searchable Encryption
- Learning Correct Cryptography by Example — Seth James Nielson Christopher K
- How Secure Is Deterministic Encryption?
- Introduction to Cryptography, Part II
- Symmetric-Key Encryption
- Scaling Key Management: Thousands of Clients, Trillions of Operations
- A Synopsis of Format-Preserving Encryption
- Symmetric Private Information Retrieval Via Additive Homomorphic Probabilistic Encryption
- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
- Computer Security CS 526 Topic 4
- Searchable Symmetric Encryption with Forward Search Privacy
- Algorithms, Key Size and Parameters Report – 2014
- Shield Platform Encryption Architecture
- A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing
- Incremental Deterministic Public-Key Encryption
- CY 2550 Foundations of Cybersecurity Cryptography Part 4 January 30 Alina Oprea Associate Professor, Khoury College Northeastern University Outline
- Better Security for Deterministic Public-Key Encryption: the Auxiliary-Input Setting
- A Mathematical Framework Towards Efficient Clifford-Based Homomorphic Cryptosystems Using P-Adic Numbers
- Solution: an Adversary Can Provide Two Plaintexts a and B to Be Encrypted
- Homomorphic Encryption: Theory & Application
- Efficient Constructions of Deterministic Encryption from Hybrid Encryption
- Popa & Wagner Spring 2020 CS 161 Computer Security Discussion 3
- Lecture 15: Public Key Encryption: I 1 Setting 2 Definition
- Lecture 10: Randomness, Pseudo-Randomness, Security of Block Ciphers
- Chapter 4 Symmetric Encryption
- PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density
- A Unified Approach to Deterministic Encryption
- Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density
- 18 a Survey of Provably Secure Searchable Encryption
- CY 2550 Foundations of Cybersecurity Cryptography Part 3 January 27 Alina Oprea Associate Professor, Khoury College Northeastern University Outline
- Misuse-Resistant Cryptography for JOSE/JWT
- Cryptography I
- SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
- Plaintext-Checkable Encryption
- Deterministic Authenticated-Encryption a Provable-Security Treatment of the Key-Wrap Problem
- Try Again. Fail Again. Fail Better. New Notions of Security, Broken Assumptions, and Increased Efficiency in Cryptography