Sciweavers

24188 search results - page 59 / 4838
» Computing on Encrypted Data
Sort
View
JUCS
2007
102views more  JUCS 2007»
14 years 10 months ago
The Use of Runtime Reconfiguration on FPGA Circuits to Increase the Performance of the AES Algorithm Implementation
: This article presents an architecture that encrypts data with the AES algorithm. This architecture can be implemented on the Xilinx Virtex II FPGA family, by applying pipelining ...
Oscar Pérez, Yves Berviller, Camel Tanougas...
SEC
2007
14 years 11 months ago
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsou...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
CCR
1999
138views more  CCR 1999»
14 years 9 months ago
Context-agile encryption for high speed communication networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
IACR
2011
122views more  IACR 2011»
13 years 9 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
13 years 5 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...