• ADSNARK

  • Referenced in 8 articles [sw22496]
  • ADSNARK: nearly practical and privacy-preserving proofs on authenticated data. We study the problem ... privacy-preserving proofs on authenticated data, where a party receives data from a trusted source ... proving arbitrary computations over authenticated data in a privacy-preserving manner. ADSNARK improves significantly over...
  • McOE

  • Referenced in 16 articles [sw20876]
  • Authenticated Encryption Schemes. On-Line Authenticated Encryption (OAE) combines privacy with data integrity ... computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line...
  • ELmD

  • Referenced in 14 articles [sw20823]
  • Authenticated encryption schemes which resist misuse of nonce at some desired level of privacy ... provide full privacy) and online constructions like McOE, sponge-type authenticated encryptions (such as duplex ... paper, we design a new online secure authenticated encryption, called ELmD or Encrypt-Linear ... fully pipeline implementable. It also provides full privacy when associated data is not repeated. Like...
  • ELmE

  • Referenced in 5 articles [sw22881]
  • misuse resistant parallel authenticated encryption. The authenticated encryptions which resist misuse of initial value ... nonce) at some desired level of privacy are two-pass or Mac-then-Encrypt constructions ... provide full privacy) and online constructions, e.g., McOE, sponge-type authenticated encryptions (such as duplex ... paper, we design a new online secure authenticated encryption, called ELmE or Encrypt-Linear...
  • SeVe

  • Referenced in 2 articles [sw06547]
  • tools focus on secrecy and authentication properties, few supports privacy properties like anonymity, receipt freeness ... formal definitions for three types of privacy properties based on trace equivalence and knowledge reasoning ... other security properties, such as secrecy and authentication, are introduced under this framework ... automatic verifier for security protocols related to privacy type, which are mostly verified by hand...
  • COBRA

  • Referenced in 4 articles [sw22878]
  • mode of operation for nonce-based authenticated encryption, performing one block cipher call plus ... preserves privacy up to prefix under nonce repetition. However, COBRA only provides authenticity against nonce...
  • Chaffinch

  • Referenced in 1 article [sw19155]
  • legal advantage of using authentication keys to provide privacy. We identify a weakness in Rivest...
  • ConCert

  • Referenced in 1 article [sw21363]
  • privacy policies by examining intrinsic properties of code. Certified code complements authentication and provides...
  • Salus

  • Referenced in 1 article [sw35842]
  • increasingly being used to perform security and privacy critical tasks. The software used to perform ... they are allowed to perform and to authenticate their callers and callees, the impact...
  • AudiTEE

  • Referenced in 0 articles [sw39962]
  • distributed ledger in a generic, efficient, and privacy-preserving manner. AudiTEE leverages Trusted Execution Environment ... AudiTEE takes advantage of KAMT (K-anonymity Authentication Based on Merkle Tree) protocol for efficient...
  • Coq

  • Referenced in 1890 articles [sw00161]
  • Coq is a formal proof management system. It...
  • MapReduce

  • Referenced in 263 articles [sw00546]
  • MapReduce is a new parallel programming model initially...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...
  • SageMath

  • Referenced in 1994 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • McEliece

  • Referenced in 251 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • SPADE

  • Referenced in 89 articles [sw02226]
  • In this paper we present SPADE, a new...
  • BLISS

  • Referenced in 24 articles [sw02301]
  • BLISS: Bimodal Lattice Signature Schemes. This implementation in...
  • M-TREE

  • Referenced in 14 articles [sw02565]
  • Secure processor architectures enable new sets of applications...