Alice and Bob

Results: 105



#Item
21A Machine-Checked Formalization of Σ-Protocols Santiago Zanella-B´eguelin1 Gilles Barthe1 Daniel Hedin1 Benjamin Gr´egoire2 Sylvain Heraud2 1 IMDEA

A Machine-Checked Formalization of Σ-Protocols Santiago Zanella-B´eguelin1 Gilles Barthe1 Daniel Hedin1 Benjamin Gr´egoire2 Sylvain Heraud2 1 IMDEA

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
22Quantum Key Recycling Joint work with Ivan Damg˚ ard and Louis Salvail  Thomas B. Pedersen

Quantum Key Recycling Joint work with Ivan Damg˚ ard and Louis Salvail Thomas B. Pedersen

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-31 11:29:17
23Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1  2

Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-06-02 16:07:22
24PQCRYPTO project in the EU  Tanja Lange 3 April 2015

PQCRYPTO project in the EU Tanja Lange 3 April 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:35:45
25Of Malicious Motes and Suspicious Sensors On the efficiency of malicious interference in wireless networks Seth Gilbert1 , Rachid Guerraoui2 , and Calvin Newport1 1  MIT CSAIL, {sethg,cnewport}@mit.edu

Of Malicious Motes and Suspicious Sensors On the efficiency of malicious interference in wireless networks Seth Gilbert1 , Rachid Guerraoui2 , and Calvin Newport1 1 MIT CSAIL, {sethg,cnewport}@mit.edu

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2007-09-28 06:20:39
26Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009

Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:50:52
27Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2008-03-14 04:27:53
28TRICERT: A Distributed Certified E-Mail Scheme Giuseppe Ateniese Breno de Medeiros  Michael T. Goodrich

TRICERT: A Distributed Certified E-Mail Scheme Giuseppe Ateniese Breno de Medeiros Michael T. Goodrich

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:08:05
29Lecture 18 - Zero Knowledge (cont), identification protocols Boaz Barak April 7, 2010 Reading Boneh-Shoup chapter 18. Review Protocol QR

Lecture 18 - Zero Knowledge (cont), identification protocols Boaz Barak April 7, 2010 Reading Boneh-Shoup chapter 18. Review Protocol QR

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-07 12:26:01
30Settling Multiple Debts Efficiently: Problems Tom Verhoeff Faculty of Mathematics and Computing Science Eindhoven University of Technology Email:  June 2004

Settling Multiple Debts Efficiently: Problems Tom Verhoeff Faculty of Mathematics and Computing Science Eindhoven University of Technology Email: June 2004

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2009-11-11 01:36:33