Sciweavers

981 search results - page 37 / 197
» Advanced Encryption Standard
Sort
View
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
12 years 5 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...
ACISP
2009
Springer
14 years 4 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
14 years 1 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
13 years 27 days ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
WSC
1998
13 years 11 months ago
Advanced Methods for Simulation Output Analysis
This paper reviews statistical methods for analyzing output data from computer simulations of single systems. In particular, it focuses on the problems of choosing initial conditi...
Christos Alexopoulos, Andrew F. Seila