Sciweavers

2108 search results - page 123 / 422
» Encrypted
Sort
View
115
Voted
CANS
2009
Springer
153views Cryptology» more  CANS 2009»
15 years 10 months ago
Computing on Encrypted Data
Craig Gentry
75
Voted
CANS
2009
Springer
115views Cryptology» more  CANS 2009»
15 years 10 months ago
Private-Key Hidden Vector Encryption with Key Confidentiality
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CRYPTO
2009
Springer
131views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
The well-studied task of learning a linear function with errors is a seemingly hard problem and the basis for several cryptographic schemes. Here we demonstrate additional applicat...
Benny Applebaum, David Cash, Chris Peikert, Amit S...
111
Voted
CRYPTO
2009
Springer
127views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou