×

Found 6 Documents (Results 1–6)

Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\). (English) Zbl 1519.94074

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 99-129 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linearly homomorphic encryption from \(\mathsf {DDH}\). (English) Zbl 1382.94080

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 487-505 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of cryptosystems with quadratic decryption: The nicest cryptanalysis. (English) Zbl 1239.94041

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 260-277 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An adaptation of the NICE cryptosystem to real quadratic orders. (English) Zbl 1142.94346

Vaudenay, Serge (ed.), Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 191-208 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Year of Publication

Main Field

all top 3

Software