Sciweavers

24188 search results - page 59 / 4838
» Computing on Encrypted Data
Sort
View
128
Voted
JUCS
2007
102views more  JUCS 2007»
15 years 2 months ago
The Use of Runtime Reconfiguration on FPGA Circuits to Increase the Performance of the AES Algorithm Implementation
: This article presents an architecture that encrypts data with the AES algorithm. This architecture can be implemented on the Xilinx Virtex II FPGA family, by applying pipelining ...
Oscar Pérez, Yves Berviller, Camel Tanougas...
99
Voted
SEC
2007
15 years 4 months ago
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsou...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
103
Voted
CCR
1999
138views more  CCR 1999»
15 years 2 months ago
Context-agile encryption for high speed communication networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
148
Voted
IACR
2011
122views more  IACR 2011»
14 years 2 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
166
Voted
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
13 years 10 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...