Search

Your search keyword '"public-key encryption"' showing total 398 results

Search Constraints

Start Over You searched for: Descriptor "public-key encryption" Remove constraint Descriptor: "public-key encryption"
398 results on '"public-key encryption"'

Search Results

101. Authorized Keyword Search on Encrypted Data

102. Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption

103. Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions

104. New rank codes based encryption scheme using partial circulant matrices.

105. Practical MP-LWE-based encryption balancing security-risk versus efficiency.

106. Structure-preserving public-key encryption with leakage-resilient CCA security.

107. Post-Quantum Lattice-Based Cryptography Implementations: A Survey.

108. Mixed-radix Naccache–Stern encryption.

109. A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.

110. Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter.

111. Simulation-based selective opening security for receivers under chosen-ciphertext attacks.

112. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.

113. Public-Key Encryption Resilient to Linear Related-Key Attacks

114. Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter

115. Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency

116. An Algebraic Framework for Diffie-Hellman Assumptions

117. Anonymity-Preserving Public-Key Encryption: A Constructive Approach

118. Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem

119. Efficient Cryptosystems from 2 k -th Power Residue Symbols

120. Circular Chosen-Ciphertext Security with Compact Ciphertexts

121. Robust Encryption, Revisited

122. Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness

123. Tightly Secure Signatures and Public-Key Encryption

124. On Definitions of Selective Opening Security

125. All-But-Many Lossy Trapdoor Functions

126. Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions

128. Structure Preserving CCA Secure Encryption and Applications

129. Polly Cracker, Revisited

130. Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing

131. Generic Construction of Strongly Secure Timed-Release Public-Key Encryption

132. Benaloh’s Dense Probabilistic Encryption Revisited

133. New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems

134. Public-Key Encryptions Tolerating Adaptive and Composable Adversaries

135. Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles

136. More Constructions of Lossy and Correlation-Secure Trapdoor Functions

137. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions

138. A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems

139. Tightly Secure Encryption Schemes against Related-Key Attacks.

140. Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.

141. Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions.

142. Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system.

143. Decentralized enforcement of document lifecycle constraints.

144. Efficient Encryption From Random Quasi-Cyclic Codes.

145. Improved, black-box, non-malleable encryption from semantic security.

146. Public-Key Encryption with Tight Simulation-Based Selective-Opening Security.

147. Incremental Deterministic Public-Key Encryption.

148. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption.

149. Improved Non-committing Encryption with Applications to Adaptively Secure Protocols

150. Chosen-Ciphertext Secure RSA-Type Cryptosystems

Catalog

Books, media, physical & digital resources