[PDF][PDF] A survey of homomorphic encryption for nonspecialists

C Fontaine, F Galand - EURASIP Journal on Information Security, 2007 - Springer
Processing encrypted signals requires special properties of the underlying encryption
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …

[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Network security: current status and future directions

C Douligeris, DN Serpanos - 2007 - books.google.com
A unique overview of network security issues, solutions, and methodologies at an
architectural and research level Network Security provides the latest research and …

[图书][B] Fundamentos de bases de datos

A Silberschatz, HF Korth, S Sudarshan, FS Pérez… - 2002 - academia.edu
• Bases de datos relacionales (Capítulos 4 al 7). El Capítulo 4 se centra en el lenguaje
relacional orientado al usuario de mayor influencia: SQL. El Capítulo 5 cubre otros dos …

[图书][B] Information security: principles and practice

M Stamp - 2011 - books.google.com
Now updated—your expert guide to twenty-first century information security Information
security is a rapidly evolving field. As businesses and consumers become increasingly …

An implementation of DES and AES, secure against some attacks

ML Akkar, C Giraud - … Hardware and Embedded Systems—CHES 2001 …, 2001 - Springer
Abstract Since Power Analysis on smart cards was introduced by Paul Kocher [7], many
countermeasures have been proposed to protect implementations of cryptographic …

[图书][B] Dynamic remote data auditing for securing big data storage in cloud computing

M Sookhak - 2015 - search.proquest.com
Nowadays, organizations produce a huge amount of sensitive data, such as personal
information, financial data, and electronic health records. Consequently, the amount of …

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields

C Dobraunig, L Grassi, A Guinet, D Kuijsters - … International Conference on …, 2021 - Springer
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully
Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), the need for symmetric …

[图书][B] Disappearing cryptography: information hiding: steganography and watermarking

P Wayner - 2009 - books.google.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and
steganographic techniques. The application of said techniques facilitates message …