Sciweavers

24188 search results - page 7 / 4838
» Computing on Encrypted Data
Sort
View
AMC
2007
124views more  AMC 2007»
14 years 10 months ago
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
In this contribution instances of a problem introduced by the differential cryptanalysis of Feistel cryptosystems are formulated as optimization tasks. The performance of Evoluti...
E. C. Laskari, Gerasimos C. Meletiou, Yannis C. St...
CSE
2009
IEEE
15 years 1 months ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
EWSN
2007
Springer
15 years 9 months ago
Secure Data Aggregation with Multiple Encryption
Melek Önen, Refik Molva
CHES
2003
Springer
145views Cryptology» more  CHES 2003»
15 years 3 months ago
Cryptanalysis of DES Implemented on Computers with Cache
This paper presents the results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay...
Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Mak...
IACR
2011
149views more  IACR 2011»
13 years 9 months ago
Public Key Encryption for the Forgetful
We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
Puwen Wei, Yuliang Zheng, Xiaoyun Wang