Sciweavers

598 search results - page 62 / 120
» On the Security of ElGamal Based Encryption
Sort
View
EUROCRYPT
1999
Springer
14 years 1 days ago
Conditional Oblivious Transfer and Timed-Release Encryption
Abstract. We consider the problem of sending messages into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anon...
Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramak...
ASIACRYPT
2010
Springer
13 years 5 months ago
Faster Fully Homomorphic Encryption
Abstract. We describe two improvements to Gentry's fully homomorphic scheme based on ideal lattices and its analysis: we provide a more aggressive analysis of one of the hardn...
Damien Stehlé, Ron Steinfeld
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 18 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
ACSW
2003
13 years 9 months ago
A Secure Mental Poker Protocol Over The Internet
An eļ¬ƒcient and secure mental poker scheme is proposed in this paper. It is based on multiple encryption and decryption of individual cards. The protocol satisļ¬es all major sec...
Weiliang Zhao, Vijay Varadharajan, Yi Mu
ISNN
2005
Springer
14 years 1 months ago
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
Abstract. In ISNNā€™04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the secur...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen