Cryptology ePrint Archive: Report 2011/096

Available versions in chronological order


Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters

Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters

Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters

Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters

Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
Publication Info: Full version of paper in TCC 2012.


[ Cryptology ePrint archive ]