Search

Showing total 30 results

Search Constraints

Start Over You searched for: Topic data encryption Remove constraint Topic: data encryption Topic public key cryptography Remove constraint Topic: public key cryptography Journal computer journal Remove constraint Journal: computer journal
30 results

Search Results

1. A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search.

2. Advanced Security Technologies and Services for Future Computing Environments.

3. Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.

4. Klepto for Ring-LWE Encryption.

5. Identity-Based Broadcast Encryption for Inner Products.

6. Bounded Revocable and Outsourceable ABE for Secure Data Sharing.

7. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme.

8. On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme.

9. RGB, a Mixed Multivariate Signature Scheme.

10. Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.

11. Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.

12. Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.

13. Revocable Group Signature with Constant-Size Revocation List.

14. PKE-AET: Public Key Encryption with Authorized Equality Test.

15. Public Key Encryption with Delegated Equality Test in a Multi-User Setting.

16. CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System†.

17. Forward-Secure Hierarchical Predicate Encryption.

18. A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.

19. Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.

20. Visual Cryptography Schemes with Reversing.

21. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.

22. Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security.

23. Practical Attribute-based Signature: Traceability and Revocability.

24. Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.

25. Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.

26. Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms.

27. Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited.

28. Extend the Concept of Public Key Encryption with Delegated Search.

29. Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.

30. Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure.