-
1
-
-
84859795614
-
IBM 4765 cryptographic coprocessor
-
Todd W. Arnold, Carl U. Buscaglia, F. Chan, Vincenzo Condorelli, John C. Dayka, W. Santiago-Fernandez, Nihad Hadzic, Michael D. Hocker, M. Jordan, T. E. Morris, and Klaus Werner. IBM 4765 Cryptographic Coprocessor. IBM Journal of Research and Development, 56(1):10, 2012.
-
(2012)
IBM Journal of Research and Development
, vol.56
, Issue.1
, pp. 10
-
-
Arnold, T.W.1
Buscaglia, C.U.2
Chan, F.3
Condorelli, V.4
Dayka, J.C.5
Santiago-Fernandez, W.6
Hadzic, N.7
Hocker, M.D.8
Jordan, M.9
Morris, T.E.10
Werner, K.11
-
2
-
-
4043168634
-
The ibm PCIXCC: A new cryptographic coprocessor for the ibm eserver
-
Todd W. Arnold and Leendert van Doorn. The IBM PCIXCC: A New Cryptographic Coprocessor for the IBM eServer. IBM Journal of Research and Development, 48(3-4):475-488, 2004.
-
(2004)
IBM Journal of Research and Development
, vol.48
, Issue.3-4
, pp. 475-488
-
-
Arnold, T.W.1
Van Doorn, L.2
-
4
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE
-
Mihir Bellare, Anand Desai, Eron Jokipii, and Phillip Rogaway. A Concrete Security Treatment of Symmetric Encryption. In Foundations of Computer Science, pages 394-403. IEEE, 1997.
-
(1997)
Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
6
-
-
84879846974
-
Private database queries using somewhat homomorphic encryption
-
Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, and David J. Wu. Private Database Queries Using Somewhat Homomorphic Encryption. In ACNS, pages 102-118, 2013.
-
(2013)
ACNS
, pp. 102-118
-
-
Boneh, D.1
Gentry, C.2
Halevi, S.3
Wang, F.4
Wu, D.J.5
-
7
-
-
84867033179
-
Selective document retrieval from encrypted database
-
Christoph Bosch, Qiang Tang, Pieter H. Hartel, and Willem Jonker. Selective Document Retrieval from Encrypted Database. In ISC, pages 224-241, 2012.
-
(2012)
ISC
, pp. 224-241
-
-
Bosch, C.1
Tang, Q.2
Hartel, P.H.3
Jonker, W.4
-
8
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Yan-Cheng Chang and Michael Mitzenmacher. Privacy Preserving Keyword Searches on Remote Encrypted Data. In ACNS, pages 442-455, 2005.
-
(2005)
ACNS
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
9
-
-
0032201622
-
Private information retrieval
-
November
-
Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. Private Information Retrieval. Journal of the ACM, 45(6):965-981, November 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
10
-
-
85037333435
-
Efficient techniques for privacy-preserving sharing of sensitive information
-
Emiliano De Cristofaro, Yanbin Lu, and Gene Tsudik. Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information. In TRUST, pages 239-253, 2011.
-
(2011)
TRUST
, pp. 239-253
-
-
De Cristofaro, E.1
Lu, Y.2
Tsudik, G.3
-
11
-
-
81255134906
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Journal of Computer Security, 19(5):895-934, 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.5
, pp. 895-934
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
12
-
-
33244488406
-
-
Cryptology ePrint Archive, Report 2003/216
-
Eu-Jin Goh. Secure Indexes. Cryptology ePrint Archive, Report 2003/216, 2003.
-
(2003)
Secure Indexes
-
-
Goh, E.-J.1
-
14
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Oded Goldreich and Rafail Ostrovsky. Software Protection and Simulation on Oblivious RAMs. J. ACM, 43(3):431-473, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
15
-
-
84883285558
-
Parallel and dynamic searchable symmetric encryption
-
Seny Kamara and Charalampos Papamanthou. Parallel and Dynamic Searchable Symmetric Encryption. In Financial Cryptography, pages 258-274, 2013.
-
(2013)
Financial Cryptography
, pp. 258-274
-
-
Kamara, S.1
Papamanthou, C.2
-
17
-
-
26444442384
-
Security issues in querying encrypted data
-
Murat Kantarcioglu and Chris Clifton. Security Issues in Querying Encrypted Data. In DBSec, pages 325-337, 2005.
-
(2005)
DBSec
, pp. 325-337
-
-
Kantarcioglu, M.1
Clifton, C.2
-
18
-
-
84865817216
-
UC-secure searchable symmetric encryption
-
Kaoru Kurosawa and Yasuhiro Ohtaki. UC-Secure Searchable Symmetric Encryption. In Financial Cryptography, pages 285-298, 2012.
-
(2012)
Financial Cryptography
, pp. 285-298
-
-
Kurosawa, K.1
Ohtaki, Y.2
-
20
-
-
84893808472
-
Search pattern leakage in searchable encryption: Attacks and new construction
-
Chang Liu, Liehuang Zhu, Mingzhong Wang, and Yu an Tan. Search Pattern Leakage in Searchable Encryption: Attacks and New Construction. Inf. Sci., 265:176-188, 2014.
-
(2014)
Inf. Sci
, vol.265
, pp. 176-188
-
-
Liu, C.1
Zhu, L.2
Wang, M.3
An Tan, Y.4
-
21
-
-
0025154732
-
Efficient computation on oblivious RAMs
-
Rafail Ostrovsky. Efficient Computation on Oblivious RAMs. In STOC, pages 514-523, 1990.
-
(1990)
STOC
, pp. 514-523
-
-
Ostrovsky, R.1
-
23
-
-
84888390701
-
Efficiently outsourcing multiparty computation under multiple keys
-
Andreas Peter, Erik Tews, and Stefan Katzenbeisser. Efficiently outsourcing multiparty computation under multiple keys. IEEE Transactions on Information Forensics and Security, 8(12):2046-2058, 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.12
, pp. 2046-2058
-
-
Peter, A.1
Tews, E.2
Katzenbeisser, S.3
-
24
-
-
74049149270
-
Secure anonymous database search
-
Mariana Raykova, Binh Vo, Steven M. Bellovin, and Tal Malkin. Secure Anonymous Database Search. In CCSW, pages 115-126, 2009.
-
(2009)
CCSW
, pp. 115-126
-
-
Raykova, M.1
Vo, B.2
Bellovin, S.M.3
Malkin, T.4
-
25
-
-
70350649061
-
Predicate privacy in encryption systems
-
Emily Shen, Elaine Shi, and Brent Waters. Predicate Privacy in Encryption Systems. In TCC, pages 457-473, 2009.
-
(2009)
TCC
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
27
-
-
78649836731
-
Computationally efficient searchable symmetric encryption
-
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, and Willem Jonker. Computationally Efficient Searchable Symmetric Encryption. In Secure Data Management, pages 87-100, 2010.
-
(2010)
Secure Data Management
, pp. 87-100
-
-
Van Liesdonk, P.1
Sedghi, S.2
Doumen, J.3
Hartel, P.H.4
Jonker, W.5
-
28
-
-
70350676849
-
An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data
-
Peishun Wang, Huaxiong Wang, and Josef Pieprzyk. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. In WISA, pages 145-159, 2008.
-
(2008)
WISA
, pp. 145-159
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
-
29
-
-
58449092891
-
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
-
Peishun Wang, Huaxiong Wang, and Josef Pieprzyk. Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. In CANS, pages 178-195, 2008.
-
(2008)
CANS
, pp. 178-195
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
|