ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
CryptoBlaze: A partially homomorphic processor with multiple instructions and non-deterministic encryption support
2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC)
◽
10.1109/aspdac.2018.8297404
◽
2018
◽
Cited By ~ 5
Author(s):
Florencia Irena
◽
Daniel Murphy
◽
Sri Parameswaran
Keyword(s):
Deterministic Encryption
Download Full-text
Related Documents
Cited By
References
Quantifying Information Leakage of Deterministic Encryption
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop - CCSW'19
◽
10.1145/3338466.3358915
◽
2019
◽
Author(s):
Mireya Jurado
◽
Geoffrey Smith
Keyword(s):
Information Leakage
◽
Deterministic Encryption
Download Full-text
The Local Forking Lemma and Its Application to Deterministic Encryption
Lecture Notes in Computer Science - Advances in Cryptology – ASIACRYPT 2019
◽
10.1007/978-3-030-34618-8_21
◽
2019
◽
pp. 607-636
Author(s):
Mihir Bellare
◽
Wei Dai
◽
Lucy Li
Keyword(s):
Deterministic Encryption
◽
Forking Lemma
Download Full-text
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - Lecture Notes in Computer Science
◽
10.1007/978-3-642-02181-7_17
◽
2009
◽
pp. 159-168
◽
Cited By ~ 1
Author(s):
Yang Cui
◽
Kirill Morozov
◽
Kazukuni Kobara
◽
Hideki Imai
Keyword(s):
Hybrid Encryption
◽
Deterministic Encryption
Download Full-text
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Journal of Cryptology
◽
10.1007/s00145-013-9174-5
◽
2013
◽
Vol 28
(3)
◽
pp. 671-717
◽
Cited By ~ 6
Author(s):
Benjamin Fuller
◽
Adam O’Neill
◽
Leonid Reyzin
Keyword(s):
Unified Approach
◽
Deterministic Encryption
◽
Computational Entropy
Download Full-text
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science - Lecture Notes in Computer Science
◽
10.1007/978-3-540-77050-3_30
◽
2007
◽
pp. 364-375
◽
Cited By ~ 9
Author(s):
Judicaël Courant
◽
Cristian Ene
◽
Yassine Lakhnech
Keyword(s):
Deterministic Encryption
Download Full-text
On ELFs, Deterministic Encryption, and Correlated-Input Security
Advances in Cryptology – EUROCRYPT 2019 - Lecture Notes in Computer Science
◽
10.1007/978-3-030-17659-4_1
◽
2019
◽
pp. 3-32
Author(s):
Mark Zhandry
Keyword(s):
Deterministic Encryption
Download Full-text
A generic construction of CCA-secure deterministic encryption
Information Processing Letters
◽
10.1016/j.ipl.2019.105865
◽
2020
◽
Vol 154
◽
pp. 105865
Author(s):
Meijuan Huang
◽
Bo Yang
◽
Yi Zhao
◽
Xin Wang
◽
Yanwei Zhou
◽
...
Keyword(s):
Deterministic Encryption
◽
Generic Construction
Download Full-text
How Secure is Deterministic Encryption?
Lecture Notes in Computer Science - Public-Key Cryptography -- PKC 2015
◽
10.1007/978-3-662-46447-2_3
◽
2015
◽
pp. 52-73
◽
Cited By ~ 3
Author(s):
Mihir Bellare
◽
Rafael Dowsley
◽
Sriram Keelveedhi
Keyword(s):
Deterministic Encryption
Download Full-text
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
IEEE Access
◽
10.1109/access.2019.2891075
◽
2019
◽
Vol 7
◽
pp. 6765-6773
◽
Cited By ~ 1
Author(s):
Linming Gong
◽
Mingming Wang
◽
Xiangjian Zuo
◽
Shundong Li
◽
Daoshun Wang
Keyword(s):
Deterministic Encryption
◽
Encryption Schemes
Download Full-text
Deterministic Encryption with the Thorp Shuffle
Journal of Cryptology
◽
10.1007/s00145-017-9262-z
◽
2017
◽
Vol 31
(2)
◽
pp. 521-536
◽
Cited By ~ 1
Author(s):
Ben Morris
◽
Phillip Rogaway
◽
Till Stegers
Keyword(s):
Deterministic Encryption
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close