Cryptology ePrint Archive

Results: 16



#Item
1Algebra / Abstract algebra / Mathematics / Group theory / Linear algebra / Pairing-based cryptography / Subgroup / Pairing / XTR / Generalized flag variety

Full version of an extended abstract published in Proceedings of PKC 2015, Springer-Verlag, 2015. Available from the IACR Cryptology ePrint Archive as ReportA Profitable Sub-Prime Loan: Obtaining the Advantage

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
2Cryptography / E-commerce / RSA / Public-key cryptography / Cryptosystem

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
3Cryptography / Zero-knowledge proof / Proof of knowledge / Malleability / Mathematical proof / Non-interactive zero-knowledge proof / Ciphertext indistinguishability / Homomorphic encryption / FiatShamir heuristic

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
4

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2012-12-14 15:13:49
    5

    Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

    Add to Reading List

    Source URL: www.bmoeller.de

    Language: English - Date: 2008-05-19 15:51:37
      6Group theory / Algorithm / Applied mathematics / Mathematics / Elliptic curves / Analytic number theory

      Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity [Cryptology ePrint Archive, ReportBenoˆıt Chevallier-Mames1 , Mathieu Ciet2 , and Marc Joye1 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2003-11-12 11:22:51
      7Numeral systems / Elliptic Curve DSA / Exponentiation / Logarithm / Radix / Precomputation / Elliptic curve cryptography / Exponentiation by squaring / Mathematics / Abstract algebra / Exponentials

      Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

      Add to Reading List

      Source URL: www.bmoeller.de

      Language: English - Date: 2008-05-19 15:51:37
      8Cyberwarfare / Electronic commerce / Civil law / Token coin / Tokens / Group signature / Security / Public key certificate / Digital signature / Cryptography / Key management / Public-key cryptography

      Full version of an extended abstract published in Proceedings of ACM CCS 2006, ACM Press, 2006. Available from the IACR Cryptology ePrint Archive as ReportHow to Win the Clone Wars: Efficient Periodic n-Times

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2007-04-11 21:27:39
      9Applied mathematics / Learning with errors / Public-key cryptography / Cipher / Mathematics / Technology / Cryptography / Ciphertext indistinguishability / RSA

      Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2012-12-14 15:12:37
      10Eurocrypt / Academic publishing / Cryptology ePrint Archive / International Association for Cryptologic Research / Asiacrypt / Theory of Cryptography Conference / International Cryptology Conference

      IACR Guidelines for Authors Sept 2014∗ Dear Author, The purpose of this document is to clarify aspects of submission to a publication of the IACR. These guidelines complement other guidelines available on the IACR webs

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2014-09-22 14:38:03
      UPDATE