22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[14] Bogdanov, Andrej, and Lee, Chin Ho, "Homomorphic encryption from codes" Cryptology<br />

ePrint Archive, Report 2011/622, 2011. http://eprint.iacr.org/2011/622<br />

[15] Brakerski, Zvika, "When Homomorphism Becomes a Liability," TCC 2013,<br />

http://eprint.iacr.org/2012/225<br />

[16] Boneh, Dan, and Zhandry, Mark, "Quantum-secure Message Authentication Codes,"<br />

Eurocrypt, 2013, http://eprint.iacr.org/2012/606<br />

[17] Wu, David; Haven, Jacob; and Boneh, Dan, "Using Homomorphic Encryption for Large<br />

Scale Statistical Analysis," CURIS 2012. www.stanford.edu/~dwu4/CURISPoster.pdf<br />

[18] Halevi, Shai, and Shoup, Victor, "Design and Implementation of a Homomorphic-<br />

Encryption Library," to be submitted. http://researcher.ibm.com/researcher/files/usshaih/he-library.pdf<br />

[19] Brakerski, Zvika, and Vaikuntanathan, Vinod, "Efficient fully homomorphic encryption<br />

from (standard) LWE" FOCS 2011, http://eprint.iacr.org/2011/344<br />

[20] Dolev, D.; Dwork, C.; and Naor. M., "Non-malleable cryptography" SIAM Journal on<br />

Computing, 30(2), pps 391–437, 2000, http://noodle.cs.huji.ac.il/~dolev/pubs/nmc.pdf<br />

[21] Cash, David; Kupcu, Alptekin; and Wichs, Daniel, "Dynamic Proofs of Retrievability via<br />

Oblivious RAM," Eurocrypt 2013, http://eprint.iacr.org/2012/550<br />

[22] Juels, A. and Kaliski, B., "PORs: Proofs of Retrievability for Large Files," ACM CCS, pp.<br />

584—597. 2007<br />

[23] Chandran, Nishanth; Gennaro, Rosario; Jain, Abhishek; and Sahai, Amit, "How to Delegate<br />

Secure Multiparty Computation to the Cloud," to be submitted.<br />

[24] Bellare, Mihir; Tessaro, Stephano; and Vardy, Alexander, “Semantic Security for the<br />

Wiretap Channel,” CRYPTO 2012, http://cseweb.ucsd.edu/~mihir/papers/wiretapcrypto12.pdf<br />

[25] Bellare, Mihir; Ristenpart, Thomas; and Tessaro, Stephano, “Multi-Instance Security and<br />

its Application to Password-Based Cryptography,” CRYPTO 2012,<br />

http://eprint.iacr.org/2012/196.pdf<br />

[26] Dodis, Yevgeniy; Ristenpart, Thomas; Steinberger, John, and Tessaro, Stephano, “To Hash<br />

or Not to Hash Again? (In)differentiability Results for H2 and HMAC,” CRYPTO 2012,<br />

http://people.csail.mit.edu/tessaro/papers/h2fullprelim.pdf<br />

Approved for Public Release; Distribution Unlimited.<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!