-
61Published 2016Table of Contents: “…-language:AR-SA">On the Hardness of Proving CCA-Security of Signed ElGamal -- CA-Secure Keyed-Fully Homomorphic…”
Full Text via HEAL-Link
Electronic eBook -
62Published 2003Table of Contents: “… of Rounds -- Secure Generalized Vickrey Auction Using Homomorphic Encryption -- Panel: Trusted Computing…”
Full Text via HEAL-Link
Electronic eBook -
63
-
64Published 2006Table of Contents: “…-Knowledge with Restricted Random Oracles -- Non-interactive Zero-Knowledge from Homomorphic Encryption…”
Full Text via HEAL-Link
Electronic eBook -
65Published 2010Table of Contents: “… in Weakened Random Oracle Models -- Fully Homomorphic Encryption with Relatively Small Key and Ciphertext…”
Full Text via HEAL-Link
Electronic eBook -
66Published 2008Table of Contents: “… -- Cryptography I -- Homomorphic Encryption and Signatures from Vector Decomposition -- Hidden-Vector Encryption…”
Full Text via HEAL-Link
Electronic eBook -
67Published 2013Table of Contents: “…-Key Homomorphic Encryption -- Public Key Cryptosystems -- Efficient Algorithm for Tate Pairing…”
Full Text via HEAL-Link
Electronic eBook -
68Published 2014Table of Contents: “… Updatable and Locally Decodable Codes -- Leakage Resilient Fully Homomorphic Encryption -- Securing Circuits…”
Full Text via HEAL-Link
Electronic eBook -
69
-
70Published 2002Table of Contents: “… Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic…”
Full Text via HEAL-Link
Electronic eBook -
71Published 2003Table of Contents: “… for Ring Signature Schemes -- Protocol -- Practical Mental Poker Without a TTP Based on Homomorphic…”
Full Text via HEAL-Link
Electronic eBook -
72Published 2008Table of Contents: “… Composable Framework for the Analysis of Browser-Based Security Protocols -- Threshold Homomorphic Encryption…”
Full Text via HEAL-Link
Electronic eBook -
73Published 2010Table of Contents: “… Data between Competitors -- Building Incentives into Tor -- Tree-Homomorphic Encryption and Scalable…”
Full Text via HEAL-Link
Electronic eBook -
74Published 2010Table of Contents: “… -- Optimistic Concurrent Zero Knowledge -- Lattice-Based Cryptography -- Faster Fully Homomorphic Encryption…”
Full Text via HEAL-Link
Electronic eBook -
75Published 2015Table of Contents: “… Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices…”
Full Text via HEAL-Link
Electronic eBook -
76
-
77Published 2014Table of Contents: “…-Based Cryptography -- A Comparison of the Homomorphic Encryption Schemes FV and YASHE -- Towards Lattice…”
Full Text via HEAL-Link
Electronic eBook -
78Published 2002Table of Contents: “… Schemes -- Specialized Multiparty Cryptography -- A Verifiable Secret Shuffe of Homomorphic Encryptions…”
Full Text via HEAL-Link
Electronic eBook -
79Published 2019Table of Contents: “… Video Surveillance System in Smart Environment -- Optimizations in Fully Homomorphic Encryption…”
Full Text via HEAL-Link
Electronic eBook -
80Published 2009Table of Contents: “…-Secure Encryption for Messages of Arbitrary Length -- Verifiable Rotation of Homomorphic Encryptions…”
Full Text via HEAL-Link
Electronic eBook