Search results
From MaRDI portal
- Authenticated Encryption and Its Hardware Implementation 2017-05-16 Paper INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes 2016-04-08...10 bytes (13 words) - 08:14, 24 September 2023
- \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security 2022-07-13 Paper \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public...10 bytes (13 words) - 01:01, 7 October 2023
- Public-key anamorphism in (CCA-secure) public-key encryption and beyond 2024-12-04 Paper Sender-anamorphic encryption reformulated: achieving robust and generic...10 bytes (15 words) - 09:21, 8 December 2023
- Paper An image encryption algorithm based on new chaos and diffusion values of a truth table 2024-01-10 Paper A privacy image encryption algorithm based...10 bytes (13 words) - 21:13, 10 December 2023
- provably-secure certificate-based encryption against malicious CA attacks 2020-09-09 Paper New Certificateless Public Key Encryption Secure Against Malicious KGC...10 bytes (13 words) - 04:37, 7 October 2023
- for public key encryption 2016-03-02 Paper Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption 2016-03-02 Paper...10 bytes (15 words) - 01:34, 25 September 2023
- and agreement 2023-11-02 Paper Oblivious parallel tight compaction 2023-11-02 Paper Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions...10 bytes (13 words) - 16:47, 24 September 2023
- 2016-10-28 Paper Offline witness encryption 2016-10-04 Paper On the complexity of \textsf{scrypt} and proofs of space in the parallel random oracle model 2016-07-15...10 bytes (14 words) - 03:07, 7 October 2023
- 2022-05-18 Paper Non-malleable codes for bounded parallel-time tampering 2022-04-22 Paper Secure massively parallel computation for dishonest majority 2022-03-23...10 bytes (13 words) - 08:55, 6 October 2023
- Paper (Leveled) fully homomorphic encryption without bootstrapping 2016-10-07 Paper Multi-input Functional Encryption in the Private-Key Setting: Stronger...10 bytes (13 words) - 03:01, 7 October 2023
- notion for decentralized multi-client functional encryption 2023-11-10 Paper Multi-client functional encryption with fine-grained access control 2023-08-25...10 bytes (15 words) - 16:04, 11 December 2023
- 2016-04-25 Paper Cryptography for parallel RAM from indistinguishability obfuscation 2016-04-15 Paper Oblivious parallel RAM and applications 2016-04-08...10 bytes (15 words) - 16:47, 24 September 2023
- 2007-11-29 Paper Identity Based Encryption Without Redundancy 2007-09-24 Paper Parallel Key-Insulated Public Key Encryption Without Random Oracles 2007-09-04...10 bytes (13 words) - 18:27, 6 October 2023
- 2024-11-12 Paper Multi-hop fine-grained proxy re-encryption 2024-11-12 Paper Fine-grained proxy re-encryption: definitions and constructions from LWE 2024-09-13...10 bytes (13 words) - 09:24, 6 October 2023
- 2009-03-10 Paper Timed-Release Encryption Revisited 2009-01-27 Paper General Certificateless Encryption and Timed-Release Encryption 2008-11-20 Paper Proxy Re-signatures...10 bytes (17 words) - 18:03, 24 September 2023
- 2010-12-07 Paper Parallel and concurrent security of the HB and \(HB^{+}\) protocols 2010-09-21 Paper Lower bounds on the efficiency of encryption and digital...10 bytes (16 words) - 16:09, 11 December 2023
- Efficient attribute-based proxy re-encryption with constant size ciphertexts 2022-07-06 Paper Efficiently obfuscating re-encryption program under DDH assumption...10 bytes (17 words) - 19:52, 24 September 2023
- searchable symmetric encryption 2014-05-27 Paper Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions...10 bytes (13 words) - 17:20, 6 October 2023
- Paper Three-level quantum image encryption based on Arnold transform and logistic map 2023-02-16 Paper Quantum image encryption algorithm based on bit-plane...10 bytes (13 words) - 02:07, 25 September 2023
- for public key encryption 2016-03-02 Paper Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption 2016-03-02 Paper...10 bytes (13 words) - 05:01, 7 October 2023