Sciweavers

176 search results - page 36 / 36
» Distinguishing Attacks on T-Functions
Sort
View
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
12 years 26 days ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...