Showing 61 - 80 results of 113 for search '"Homomorphic encryption"', query time: 0.12s Refine Results
  1. 61
    Published 2016
    Table of Contents: “…-language:AR-SA">On the Hardness of Proving CCA-Security of Signed ElGamal -- CA-Secure Keyed-Fully Homomorphic…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 62
    Published 2003
    Table of Contents: “… of Rounds -- Secure Generalized Vickrey Auction Using Homomorphic Encryption -- Panel: Trusted Computing…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 63
    Full Text via HEAL-Link
    Electronic eBook
  4. 64
    Published 2006
    Table of Contents: “…-Knowledge with Restricted Random Oracles -- Non-interactive Zero-Knowledge from Homomorphic Encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 65
    Published 2010
    Table of Contents: “… in Weakened Random Oracle Models -- Fully Homomorphic Encryption with Relatively Small Key and Ciphertext…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 66
    Published 2008
    Table of Contents: “… -- Cryptography I -- Homomorphic Encryption and Signatures from Vector Decomposition -- Hidden-Vector Encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 67
    Published 2013
    Table of Contents: “…-Key Homomorphic Encryption -- Public Key Cryptosystems -- Efficient Algorithm for Tate Pairing…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 68
    Published 2014
    Table of Contents: “… Updatable and Locally Decodable Codes -- Leakage Resilient Fully Homomorphic Encryption -- Securing Circuits…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 69
  10. 70
    Published 2002
    Table of Contents: “… Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 71
    Published 2003
    Table of Contents: “… for Ring Signature Schemes -- Protocol -- Practical Mental Poker Without a TTP Based on Homomorphic…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 72
    Published 2008
    Table of Contents: “… Composable Framework for the Analysis of Browser-Based Security Protocols -- Threshold Homomorphic Encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 73
    Published 2010
    Table of Contents: “… Data between Competitors -- Building Incentives into Tor -- Tree-Homomorphic Encryption and Scalable…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 74
    Published 2010
    Table of Contents: “… -- Optimistic Concurrent Zero Knowledge -- Lattice-Based Cryptography -- Faster Fully Homomorphic Encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 75
    Published 2015
    Table of Contents: “… Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 76
  17. 77
    Published 2014
    Table of Contents: “…-Based Cryptography -- A Comparison of the Homomorphic Encryption Schemes FV and YASHE -- Towards Lattice…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 78
    Published 2002
    Table of Contents: “… Schemes -- Specialized Multiparty Cryptography -- A Verifiable Secret Shuffe of Homomorphic Encryptions…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 79
    Published 2019
    Table of Contents: “… Video Surveillance System in Smart Environment -- Optimizations in Fully Homomorphic Encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 80
    Published 2009
    Table of Contents: “…-Secure Encryption for Messages of Arbitrary Length -- Verifiable Rotation of Homomorphic Encryptions…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search