Eprint

Results: 2085



#Item
221

High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2009-11-11 12:35:56
    222

    Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2010-03-19 16:16:22
      223

      Incremental Deterministic Public-Key Encryption Ilya Mironov∗ Omkant Pandey† Omer Reingold∗

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2012-01-30 19:12:55
        224

        Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits∗ Dan Boneh† Craig Gentry‡

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-05-20 14:24:26
          225

          Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer Scott E. Coull

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2013-09-30 19:57:01
            226

            Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures Vipul Goyal ∗

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-03-21 15:51:32
              227

              Shorter Circuit Obfuscation in Challenging Security Models Zvika Brakerski∗ Or Dagmi∗ Abstract

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-04-27 05:37:11
                228

                Attribute-Based Encryption for Circuits Sergey Gorbunov∗ Vinod Vaikuntanathan† Hoeteck Wee‡

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2013-05-31 21:04:06
                  229

                  Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions Sandro Coretti∗†1 , Juan Garay‡2 , Martin Hirt3 , and Vassilis Zikas§†‡4 1

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-11-22 20:50:31
                    230

                    Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2012-11-29 11:47:05
                      UPDATE