Search

Your search keyword '"DATA encryption"' showing total 145 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Journal journal of cryptology Remove constraint Journal: journal of cryptology Publisher springer nature Remove constraint Publisher: springer nature
145 results on '"DATA encryption"'

Search Results

1. Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation.

2. On the Impossibility of Structure-Preserving Deterministic Primitives.

3. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions.

4. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.

5. Key-Recovery Attacks on ASASA.

6. Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.

7. Deterministic Encryption with the Thorp Shuffle.

8. Robust Encryption.

9. Function-Private Functional Encryption in the Private-Key Setting.

10. Practical Homomorphic Message Authenticators for Arithmetic Circuits.

11. Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.

12. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption.

13. All-But-Many Encryption.

14. Reproducible Circularly Secure Bit Encryption: Applications and Realizations.

15. Authenticated Confidential Channel Establishment and the Security of TLS-DHE.

16. Locally Computable UOWHF with Linear Shrinkage.

17. Instantiability of RSA-OAEP Under Chosen-Plaintext Attack.

18. Reconciling Non-malleability with Homomorphic Encryption.

19. Secret-Sharing for NP.

20. Efficient Cryptosystems From $$\mathbf{2}^{{\varvec{k}}}$$ -th Power Residue Symbols.

21. An Algebraic Framework for Diffie-Hellman Assumptions.

22. Efficient One-Sided Adaptively Secure Computation.

23. New Second-Preimage Attacks on Hash Functions.

24. Practical Cryptanalysis of ISO 9796-2 and EMV Signatures.

25. Tightly Secure Signatures From Lossy Identification Schemes.

26. Leakage-Resilient Cryptography from Minimal Assumptions.

27. Garbling XOR Gates 'For Free' in the Standard Model.

28. A Dichotomy for Local Small-Bias Generators.

29. An Optimally Fair Coin Toss.

30. Structure-Preserving Signatures and Commitments to Group Elements.

31. Efficient Set Intersection with Simulation-Based Security.

32. Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.

33. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.

34. Computing on Authenticated Data.

35. Quantum Private Information Retrieval has Linear Communication Complexity.

36. Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?

37. Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation.

38. Slidex Attacks on the Even-Mansour Encryption Scheme.

39. Cryptanalysis of SHA-0 and Reduced SHA-1.

40. Confined Guessing: New Signatures From Standard Assumptions.

41. Cryptography in the Multi-string Model.

42. Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions.

43. On Best-Possible Obfuscation.

44. Key-Dependent Message Security: Generic Amplification and Completeness.

45. Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.

46. On Strong Simulation and Composable Point Obfuscation.

47. Security Models and Proof Strategies for Plaintext-Aware Encryption.

48. Fully Leakage-Resilient Signatures.

49. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.

50. Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.

Catalog

Books, media, physical & digital resources