Sciweavers

2108 search results - page 37 / 422
» Encrypted
Sort
View
108
Voted
CIS
2004
Springer
15 years 6 months ago
Fast Query Over Encrypted Character Data in Database
There are a lot of very important data in database, which need to be protected from attacking. Cryptographic support is an important mechanism of securing them. People, however, mu...
Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi
98
Voted
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption
Abstract. Non-committing encryption enables the construction of multiparty computation protocols secure against an adaptive adversary in the computational setting where private cha...
Ivan Damgård, Jesper Buus Nielsen
CRYPTO
1999
Springer
87views Cryptology» more  CRYPTO 1999»
15 years 5 months ago
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
We prove the equivalence of two definitions of non-malleable encryption appearing in the literature— the original one of Dolev, Dwork and Naor and the later one of Bellare, Desa...
Mihir Bellare, Amit Sahai
CARDIS
2006
Springer
146views Hardware» more  CARDIS 2006»
15 years 4 months ago
SEA: A Scalable Encryption Algorithm for Small Embedded Applications
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. In addition, they generally aim to be implemented effici...
François-Xavier Standaert, Gilles Piret, Ne...
EUROSEC
2008
ACM
15 years 2 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero