Security and Privacy Assurance Research (SPAR) Pilot Final Report
暂无分享,去创建一个
Robert K. Cunningham | Uri Blumenthal | Arkady Yerukhimovich | Lauren Milechin | Mayank Varia | Ariel Hamlin | Nabil Schear | Patrick T. Cable | Richard Shay | Benjamin Fuller | Sophia Yakoubov | Darby Mitchell | Mark Rabe | R. Shay | R. Cunningham | N. Schear | Mayank Varia | Arkady Yerukhimovich | Lauren Milechin | Sophia Yakoubov | Benjamin Fuller | Ariel Hamlin | U. Blumenthal | D. Mitchell | Mark Rabe | Richard Shay
[1] Charles V. Wright,et al. Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.
[2] Tal Malkin,et al. Malicious-Client Security in Blind Seer: A Scalable Private DBMS , 2015, 2015 IEEE Symposium on Security and Privacy.
[3] Yang Yang,et al. HEtest: A Homomorphic Encryption Testing Framework , 2015, Financial Cryptography Workshops.
[4] Robert K. Cunningham,et al. Automated Assessment of Secure Search Systems , 2015, OPSR.
[5] Jonathan Herzog,et al. A test-suite generator for database systems , 2014, 2014 IEEE High Performance Extreme Computing Conference (HPEC).
[6] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.
[7] Angelos D. Keromytis,et al. Blind Seer: A Scalable Private DBMS , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[9] Yang Yang,et al. Evaluation of Somewhat Homomorphic Encryption A Schemes , 2014 .
[10] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[11] Hugo Krawczyk,et al. Outsourced symmetric private information retrieval , 2013, IACR Cryptol. ePrint Arch..
[12] Benjamin Grégoire,et al. EasyCrypt: A Tutorial , 2013, FOSAD.
[13] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[14] Craig Gentry,et al. Private Database Queries Using Somewhat Homomorphic Encryption , 2013, ACNS.
[15] Hari Balakrishnan,et al. CryptDB: processing queries on an encrypted database , 2012, CACM.
[16] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[17] Craig Gentry,et al. Better Bootstrapping in Fully Homomorphic Encryption , 2012, Public Key Cryptography.
[18] Craig Gentry,et al. Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.
[19] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[20] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[21] Craig Gentry,et al. Fully Homomorphic Encryption without Bootstrapping , 2011, IACR Cryptol. ePrint Arch..
[22] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[23] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[24] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[25] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[26] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[27] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[28] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.