<--- Back to Details
First PageDocument Content
Tom Berson / Workshop on Cryptographic Hardware and Embedded Systems / International Cryptology Conference / Asiacrypt / PKC / Theory of Cryptography Conference / Journal of Cryptology / Bart Preneel / Cryptography / International Association for Cryptologic Research / Eurocrypt
Date: 2013-08-16 17:55:40
Tom Berson
Workshop on Cryptographic Hardware and Embedded Systems
International Cryptology Conference
Asiacrypt
PKC
Theory of Cryptography Conference
Journal of Cryptology
Bart Preneel
Cryptography
International Association for Cryptologic Research
Eurocrypt

Microsoft PowerPoint - IACR_Membership_Meeting_EC2013_publicv1

Add to Reading List

Source URL: www.iacr.org

Download Document from Source Website

File Size: 1,75 MB

Share Document on Facebook

Similar Documents

Cryptography / Digital signature / Random oracle / IP / Ibi / Schnorr signature

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

DocID: 1xVS4 - View Document

Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Transport Layer Security / Secure communication / Cryptographic protocols / QUIC / Transmission Control Protocol / Forward secrecy

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

DocID: 1xV7Y - View Document

Algebra / Abstract algebra / XTR / Verifiable random function / Computational hardness assumptions / Group theory / Lie groups

Full version of an extended abstract published in Proceedings of Eurocrypt 2014, Springer-Verlag, 2014. D´ej`a Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn∗ UC San Diego

DocID: 1xUHi - View Document

Cryptography / Zero-knowledge proof / Proof of knowledge / Malleability / Mathematical proof / Non-interactive zero-knowledge proof / Ciphertext indistinguishability / Homomorphic encryption / FiatShamir heuristic

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

DocID: 1xUhb - View Document

PDF Document

DocID: 1xqsq - View Document