72 papers:
- DATE-2015-ClercqRVV #encryption #implementation #performance
- Efficient software implementation of ring-LWE encryption (RdC, SSR, FV, IV), pp. 339–344.
- DATE-2015-KonstantinouKM #encryption #functional #privacy #verification
- Privacy-preserving functional IP verification utilizing fully homomorphic encryption (CK, AK, MM), pp. 333–338.
- SIGMOD-2015-HangKD #data access #named #query
- ENKI: Access Control for Encrypted Query Processing (IH, FK, ED), pp. 183–196.
- SIGMOD-2015-MavroforakisCOK #composition #encryption #revisited
- Modular Order-Preserving Encryption, Revisited (CM, NC, AO, GK, RC), pp. 763–777.
- SAC-2015-LopesT #framework #performance
- A framework for investigating the performance of sum aggregations over encrypted data warehouses (CCL, VCT), pp. 1000–1007.
- ASPLOS-2015-YoungNQ #encryption #named
- DEUCE: Write-Efficient Encryption for Non-Volatile Memories (VY, PJN, MKQ), pp. 33–44.
- LCTES-2015-LiuY #encryption #framework #in memory #memory management
- Secure and Durable (SEDURA): An Integrated Encryption and Wear-leveling Framework for PCM-based Main Memory (CL, CY), p. 10.
- DATE-2014-MaurichG #configuration management #encryption #lightweight
- Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices (IvM, TG), pp. 1–6.
- DATE-2014-WangYSK #encryption #energy #in memory #performance
- Energy efficient in-memory AES encryption based on nonvolatile domain-wall nanowire (YW, HY, DS, PK), pp. 1–4.
- SIGMOD-2014-ArasuEKR #query
- Querying encrypted data (AA, KE, RK, RR), pp. 1259–1261.
- STOC-2014-SahaiW #encryption #how #obfuscation
- How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
- PPDP-2014-YangEMMN #encryption #finite #unification
- Theories of Homomorphic Encryption, Unification, and the Finite Variant Property (FY, SE, CM, JM, PN), pp. 123–133.
- SAC-2014-LiuGSLSX #communication #encryption #grid #named #smarttech
- SEDE: state estimation-based dynamic encryption scheme for smart grid communication (TL, YG, YS, YL, YS, FX), pp. 539–544.
- DAC-2013-FanRRV #design #encryption #energy #security
- Low-energy encryption for medical devices: security adds an extra design dimension (JF, OR, VR, IV), p. 6.
- VLDB-2013-BotheKV #named #query
- eSkyline: Processing Skyline Queries over Encrypted Data (SB, PK, AV), pp. 1338–1341.
- VLDB-2013-TuKMZ #query
- Processing Analytical Queries over Encrypted Data (ST, MFK, SM, NZ), pp. 289–300.
- STOC-2013-GargGSW #encryption
- Witness encryption and its applications (SG, CG, AS, BW), pp. 467–476.
- STOC-2013-GoldwasserKPVZ #encryption #functional #reuse
- Reusable garbled circuits and succinct functional encryption (SG, YTK, RAP, VV, NZ), pp. 555–564.
- STOC-2013-GorbunovVW #encryption
- Attribute-based encryption for circuits (SG, VV, HW), pp. 545–554.
- DAC-2012-GuoK #concurrent #detection #encryption #fault #standard
- Invariance-based concurrent error detection for advanced encryption standard (XG, RK), pp. 573–578.
- DATE-2012-RajendranPSK #analysis #encryption #fault #logic #perspective
- Logic encryption: A fault analysis perspective (JR, YP, OS, RK), pp. 953–958.
- STOC-2012-Lopez-AltTV #encryption #multi #on the fly
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption (ALA, ET, VV), pp. 1219–1234.
- MLDM-2012-TabatabaeiAKK #classification #internet #machine learning
- Machine Learning-Based Classification of Encrypted Internet Traffic (TST, MA, FK, MK), pp. 578–592.
- SAC-2012-OmoteCSKEM #encryption
- Hypervisor-based background encryption (YO, YC, TS, TK, HE, KM), pp. 1829–1836.
- DAC-2011-KrishnamurthyMS #encryption #energy
- High-performance energy-efficient encryption in the sub-45nm CMOS Era (RK, SM, FS), p. 332.
- DocEng-2011-BalinskyCS #documentation #encryption
- Publicly posted composite documents with identity based encryption (HB, LC, SJS), pp. 239–248.
- CIKM-2011-ShiehLW #recommendation
- Recommendation in the end-to-end encrypted domain (JRS, CYL, JLW), pp. 915–924.
- PPDP-2011-EscobarKLMMNS #analysis #encryption #protocol #unification #using
- Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
- SAC-2011-Blech #encryption #logic #proving #security
- Proving the security of ElGamal encryption via indistinguishability logic (JOB), pp. 1625–1632.
- SOSP-2011-PopaRZB #named #query
- CryptDB: protecting confidentiality with encrypted query processing (RAP, CMSR, NZ, HB), pp. 85–100.
- SIGMOD-2010-RastogiN #distributed #encryption
- Differentially private aggregation of distributed time-series with transformation and encryption (VR, SN), pp. 735–746.
- ICALP-v1-2010-LibertY #encryption #performance
- Efficient Completely Non-malleable Public Key Encryption (BL, MY), pp. 127–139.
- KMIS-2010-KadhemAK #database #encryption #order #performance #relational
- A Secure and Efficient Order Preserving Encryption Scheme for Relational Databases (HK, TA, HK), pp. 25–35.
- SIGMOD-2009-WongCKM #database
- Secure kNN computation on encrypted databases (WKW, DWLC, BK, NM), pp. 139–152.
- STOC-2009-Gentry #encryption #using
- Fully homomorphic encryption using ideal lattices (CG), pp. 169–178.
- DATE-2008-ChenDC #encryption #operating system
- Operating System Controlled Processor-Memory Bus Encryption (XC, RPD, ANC), pp. 1154–1159.
- ICALP-C-2008-GilbertRS #how #problem
- How to Encrypt with the LPN Problem (HG, MJBR, YS), pp. 679–690.
- ICALP-C-2008-GoyalJPS #bound #encryption #policy
- Bounded Ciphertext Policy Attribute Based Encryption (VG, AJ, OP, AS), pp. 579–591.
- ICALP-C-2008-PrabhakaranR #encryption #security
- Homomorphic Encryption with CCA Security (MP, MR), pp. 667–678.
- ICALP-C-2008-ShiW #encryption
- Delegating Capabilities in Predicate Encryption Systems (ES, BW), pp. 560–578.
- CIKM-2008-WangYPY #assurance #encryption #query
- Dual encryption for query integrity assurance (HW, JY, CSP, PSY), pp. 863–872.
- VLDB-2007-VimercatiFJPS #data access #evolution #named #outsourcing
- Over-encryption: Management of Access Control Evolution on Outsourced Data (SDCdV, SF, SJ, SP, PS), pp. 123–134.
- ICALP-2007-FurukawaA #black box #encryption
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys (JF, NA), pp. 496–508.
- SAC-2007-KimHC #implementation #mobile #multi #performance
- An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices (HK, JH, SC), pp. 1171–1175.
- DAC-2006-ElbazTSGBM #encryption
- A parallelized way to provide data encryption and integrity checking on a processor-memory bus (RE, LT, GS, PG, MB, AM), pp. 506–509.
- VLDB-2006-WangL #database #evaluation #performance #query #xml
- Efficient Secure Query Evaluation over Encrypted XML Databases (WHW, LVSL), pp. 127–138.
- ICALP-v2-2006-AbdallaCDMNS #encryption
- Identity-Based Encryption Gone Wild (MA, DC, AWD, JML, GN, NPS), pp. 300–311.
- ICALP-v2-2006-MicciancioP #encryption #multi
- Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption (DM, SP), pp. 70–82.
- CHI-2006-GawFF #email
- Secrecy, flagging, and paranoia: adoption criteria in encrypted email (SG, EWF, PFK), pp. 591–600.
- DAC-2005-Balderas-ContrerasC #encryption #network #performance
- High performance encryption cores for 3G networks (TBC, RC), pp. 240–243.
- DATE-2005-ElbazTSGABBR #bibliography #encryption #hardware
- Hardware Engines for Bus Encryption: A Survey of Existing Techniques (RE, LT, GS, PG, CA, MB, CB, JBR), pp. 40–45.
- DATE-2005-FaroukS #algorithm #communication #encryption #hybrid #implementation #security
- An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security (HAF, MS), pp. 76–81.
- ESOP-2005-JanvierLM #encryption
- Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries (RJ, YL, LM), pp. 172–185.
- ICALP-2005-AbadiW #encryption
- Password-Based Encryption Analyzed (MA, BW), pp. 664–676.
- ICALP-2005-Galindo #encryption #revisited
- Boneh-Franklin Identity Based Encryption Revisited (DG), pp. 791–802.
- ICEIS-v1-2005-Mattsson #database #encryption #enterprise #implementation
- A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases — Protection against External and Internal Attacks on Databases (UTM), pp. 146–153.
- PPDP-2005-CortierRZ #encryption #protocol #verification
- A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures (VC, MR, EZ), pp. 12–22.
- SIGMOD-2004-AgrawalKSX #encryption
- Order-Preserving Encryption for Numeric Data (RA, JK, RS, YX), pp. 563–574.
- FoSSaCS-2004-ZuninoD #calculus #encryption #process
- A Note on the Perfect Encryption Assumption in a Process Calculus (RZ, PD), pp. 514–528.
- DATE-2003-SaputraVKIBKZ #behaviour #encryption #energy
- Masking the Energy Behavior of DES Encryption (HS, NV, MTK, MJI, RRB, SK, WZ), pp. 10084–10089.
- VLDB-2003-BouganimNPW #data access #encryption
- Chip-Secured Data Access: Reconciling Access Rights with Data Encryption (LB, FDN, PP, LW), pp. 1133–1136.
- ESOP-2003-Laud #analysis #data flow #encryption
- Handling Encryption in an Analysis for Secure Information Flow (PL), pp. 159–173.
- STOC-2003-GennaroGK #bound #encryption #performance
- Lower bounds on the efficiency of encryption and digital signature schemes (RG, YG, JK), pp. 417–425.
- SIGMOD-2002-HacigumusILM #sql
- Executing SQL over encrypted data in the database-service-provider model (HH, BRI, CL, SM), pp. 216–227.
- SAT-2002-Kullmann #adaptation #branch #database #encryption #normalisation #random #satisfiability #standard #towards #using
- Towards an adaptive density based branching rule for SAT solvers, using a database for mixed random conjunctive normal forms built upon the Advanced Encryption Standard (AES) (OK), p. 8.
- STOC-2000-KatzY #encryption #probability #security
- Complete characterization of security notions for probabilistic private-key encryption (JK, MY), pp. 245–254.
- DAC-1999-GoodmanCD #design #embedded #encryption #implementation #scalability
- Design and Implementation of a Scalable Encryption Processor with Embedded Variable DC/DC Converter (JG, AC, APD), pp. 855–860.
- DATE-1998-RunjeK #encryption #implementation
- Universal Strong Encryption FPGA Core Implementation (DR, MK), pp. 923–924.
- ICALP-1997-FrankelY #encryption #on the
- On Characterization of Escrow Encryption Schemes (YF, MY), pp. 705–715.
- ICDAR-v2-1995-CullenPR
- Reading encrypted postal indicia (MC, LP, BR), pp. 1018–1023.
- SIGIR-1989-KleinBD #encryption #retrieval
- Storing Text Retrieval Systems on CD-ROM: Compression and Encryption Considerations (STK, AB, SCD), pp. 160–167.
- STOC-1982-GoldwasserM #encryption #game studies #how #probability
- Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information (SG, SM), pp. 365–377.