Cryptography

Results: 21893



#Item
11This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-02-03 04:27:06
12ECE/CS498: Applied Cryptography  Instructor: Andrew Miller, TA: Kevin Liao Lecture 3: More Interactive Proofs 1

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 3: More Interactive Proofs 1

Add to Reading List

Source URL: gitlab-beta.engr.illinois.edu

Language: English
13Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-02 10:21:47
14This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-12-13 06:49:27
15Flexible Models for Secure Systems Sarah Meiklejohn A creation story Motivating scenario that founded modern cryptography:

Flexible Models for Secure Systems Sarah Meiklejohn A creation story Motivating scenario that founded modern cryptography:

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
16Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1  Department of Combinatorics & Optimization, University of Water

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-12-27 11:29:50
17Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-02-25 03:26:11
18Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
19Lehrstuhl f¨ur Theoretische Informationstechnik  Homework 2 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

Lehrstuhl f¨ur Theoretische Informationstechnik Homework 2 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

Add to Reading List

Source URL: www.ti.rwth-aachen.de

Language: English - Date: 2008-10-27 08:57:25