Eurocrypt

Results: 87



#Item
61Coding theory / Linear code / Error detection and correction

Decoding Random Binary Linear Codes in 2n/20 How 1+1=0 Improves Information Set Decoding A. Becker, A. Joux, A. May, A. Meurer EUROCRYPT 2012, Cambridge

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
62Message authentication codes / Cryptography / Ciphertext indistinguishability

Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs EUROCRYPT 2012, April 16th, Cambridge UK Krzysztof Pietrzak

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
63Cryptanalysis / Cryptology

HPC in Cryptanalysis A short tutorial Antoine Joux Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
64Cryptographic protocols / Schnorr signature / Digital signature / Random oracle / Fiat-Shamir heuristic / Paillier cryptosystem / Cryptography / Public-key cryptography / Forking lemma

On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin ANSSI, France 18 April, EUROCRYPT 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:21
65Asiacrypt / International Cryptology Conference / Cryptography / Group signature / Eurocrypt

Scalable Group Signature with Revocation Benoit Libert1 , Thomas Peters1 , Moti Yung2 1 - Universit´ e catholique de Louvain, Crypto Group (Belgium) 2 - Columbia University and Google Inc. (USA)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:21
66RSA / Digital signature / Cryptography / Public-key cryptography / Full Domain Hash

Optimal Security Proofs for Full-Domain Hash, revisited Cambridge, EUROCRYPT 2012 Saqib A. Kakvi Eike Kiltz Foundations of Cryptography

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:21
67Merkle–Damgård construction / Birthday attack / Hash function / One-way compression function / Preimage attack / Cryptography / Cryptographic hash functions / Message authentication codes

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
68Mathematics / Mathematical proof / Provable / Adversary / Science / Cryptography / Provable security / Knowledge

Another Look at Provable Security Alfred Menezes (joint work with Sanjit Chatterjee, Neal Koblitz, Palash Sarkar) EUROCRYPT 2012 –1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 14:09:49
69Mathematics / Group theory / Operator theory / Ordinary differential equations / Spectral theory / Finite fields / Verifiable random function / XTR

Full version of an extended abstract published in Proceedings of Eurocrypt 2014, Springer-Verlag, 2014. D´ej`a Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn∗ UC San Diego

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:43
70Key management / Security / Applied mathematics / Digital signature / Signcryption / RSA / ID-based encryption / Key / Malleability / Cryptography / Public-key cryptography / Cyberwarfare

A preliminary version of this paper appears in the proceedings of Eurocrypt[removed]This is the full version, which appears as IACR ePrint Archive Record[removed]Key-Versatile Signatures and Applications: RKA, KDM and Jo

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:43
UPDATE