Search

Your search keyword '"public-key encryption"' showing total 398 results

Search Constraints

Start Over You searched for: Descriptor "public-key encryption" Remove constraint Descriptor: "public-key encryption"
398 results on '"public-key encryption"'

Search Results

201. Post-challenge leakage in public-key encryption.

202. Privacy preserving revocable predicate encryption revisited.

203. Analysing the HPKE Standard

204. DCCA-Secure Public-Key Encryptions from Hybrid Paradigms.

205. A public-key exchange cryptographic technique using matrix.

206. An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles.

207. Reductionist Security Arguments for Public-Key Cryptographic Schemes Based on Group Action.

208. Voter Verifiable and Single Transferable Electronic Voting for Elections with Electoral Barriers.

209. Timed encryption with application to deniable key exchange.

210. Lattice-based certificateless public-key encryption in the standard model.

211. RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions.

212. Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption.

213. Lattice-based completely non-malleable public-key encryption in the standard model.

214. Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.

215. EFFICIENT FULLY HOMOMORPHIC ENCRYPTION FROM (STANDARD) LWE.

216. Efficient Linear Homomorphic Encryption from LWE Over Rings.

217. Lattice-based public-key encryption with resistance of ciphertext-only attack.

218. Security Models and Proof Strategies for Plaintext-Aware Encryption.

219. Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions

220. Protocoles cryptographiques pour la protection de la vie privée

222. Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness.

223. New public key cryptosystems based on non-Abelian factorization problems.

224. An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption.

225. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.

226. Efficient chosen ciphertext secure public-key encryption under factoring assumption.

227. Practical Chosen Ciphertext Secure Encryption from Factoring.

228. More Constructions of Lossy and Correlation-Secure Trapdoor Functions.

230. Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages.

231. A CCA2 Secure Variant of the McEliece Cryptosystem.

232. An Asymmetric Encryption Algorithm for Wireless Sensor Networks Based on Elliptic Curve Cryptosystem.

233. PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE.

234. Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.

235. A generalization of Paillier's public-key system with applications to electronic voting.

236. CHOSEN-CIPHERTEXT SECURITY VIA CORRELATED PRODUCTS.

237. Key management of the double random-phase-encoding method using public-key encryption

240. A Computationally Sound Mechanized Prover for Security Protocols.

241. A Forward-Secure Public-Key Encryption Scheme.

242. When Cryptographers Turn Lead into Gold.

243. CHOSEN-CIPHERTEXT SECURITY FROM IDENTITY-BASED ENCRYPTION.

244. A practical approach to attaining chosen ciphertext security.

245. A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions.

246. A Memory Optimized Public-Key Crypto Algorithm Using Modified Modular Exponentiation (MME).

247. RSA-OAEP Is Secure under the RSA Assumption.

248. DESIGN AND ANALYSIS OF PRACTICAL PUBLIC-KEY ENCRYPTION SCHEMES SECURE AGAINST ADAPTIVE CHOSEN CIPHERTEXT ATTACK.

249. Asymmetric cryptography and practical security

250. Preserving privacy in speaker and speech characterisation

Catalog

Books, media, physical & digital resources