Back to Results
First PageMeta Content
RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Cipher / Advantage / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption


An Ideal-Security Protocol for Order-Preserving Encoding† Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL
Add to Reading List

Document Date: 2013-09-14 01:52:37


Open Document

File Size: 833,97 KB

Share Result on Facebook

Company

AES / MySQL / /

Event

FDA Phase / /

IndustryTerm

malicious server / web applications / traversal algorithm / database server / unmodified software / decryption algorithm / encryption protocol / untrustworthy server / search tree / computing / cloud computing / balanced search tree containing / binary search tree / stateful server / encryption algorithm / /

Organization

MIT / /

Person

Frank H. Li / Cl / Ada Popa / Adversary Adv / /

Product

CCA2 / /

ProgrammingLanguage

SQL / /

RadioStation

WORK 2 / /

Technology

encryption / DET encryption / OPE Tree traversal algorithm / CRM / previous order-preserving encryption / RND encryption / Enc algorithm / encryption algorithm / interactive algorithm / Keywords-order-preserving encryption / 8 Algorithm / DET encryptions / property-preserving encryption / industry use order-preserving encryption / encryption protocol / secret key / decryption algorithm / Order-preserving encryption / Order algorithm / Return st. Algorithm / midi / interactive protocol / resulting protocol / /

SocialTag