IACR

Results: 2241



#Item
991Abstract algebra / Combinatorics / Permutation

A Group-theory Method to The Cycle Structures of Feedback Shift Registers Ming Li Yupeng Jiang and Dongdai Lin State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Scienc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 03:59:26
992Modular arithmetic / Public-key cryptography / Quadratic residue / Commutative algebra / Rabin cryptosystem / RSA / Blum integer / Modulo operation / Legendre symbol / Abstract algebra / Mathematics / Cryptography

Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov, Yandex LLC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 08:08:37
993Computer security / Crime prevention / Electronic commerce / National security / Public safety / Security / Computer network security / Secure communication

Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds Gilles Barthe2 Andre Scedrov1 1 University

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-31 09:39:58
994Hash function / Cyberwarfare / Quantum superposition / Security / Applied mathematics / Cryptography / Commitment scheme / Cryptographic hash function

Computationally binding quantum commitments Dominique Unruh University of Tartu April 21, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 10:58:50
995General number field sieve / Special number field sieve / Integer factorization / Arjen Lenstra / Herman te Riele / Factor base / RSA / Factorization / Jens Franke / Integer factorization algorithms / Cryptography / Mathematics

Factorization of a 1061-bit number by the Special Number Field Sieve Greg Childers California State University Fullerton Fullerton, CAAugust 4, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-06 19:06:43
996PP / Cryptanalysis / Quantum information science / PH / Theoretical computer science / Applied mathematics / Quantum complexity theory

Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case Marta Conde Pena1 Jean-Charles Faug`ere2,3,4

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 10:53:08
997Internet privacy / Privacy / Polynomial / Ethics / Multiset / Carnegie Mellon University

Privacy-Preserving Set Operations Lea Kissner Dawn Song

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-31 11:28:35
998

Anonymous Transferable E-cash Foteini Baldimtsi Melissa Chase Georg Fuchsbauer Markulf Kohlweiss

Add to Reading List

Source URL: www.iacr.org

- Date: 2015-03-30 08:40:56
    999Electronic commerce / Internet privacy / Signcryption / Encryption / Cipher / Secure communication / National Security Agency / Key generation / Secure multi-party computation / Cryptography / Public-key cryptography / Cryptographic protocols

    SECURITY INTELLIGENCE for BROADCAST: THREAT ANALYTICS Sumit Chakraborty Fellow, Indian Institute of Management Calcutta, BEE (Jadavpur University), India E-mail: , ; Phon

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-18 09:37:56
    1000SHA-2 / Collision attack / MD5 / Preimage attack / MD4 / Cryptanalysis / Collision / Hash function / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / SHA-1

    Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-20 04:23:58
    UPDATE