IACR

Results: 2241



#Item
151Cryptography / Common reference string model / Non-interactive zero-knowledge proof / Cryptocurrencies / Private currencies / Zero-knowledge proof / Snark / Standard model / Compagnies Rpublicaines de Scurit / IP / Commercial Resupply Services / CRS-1

Updatable and Universal Common Reference Strings with Applications to zk-SNARKs Jens Groth1? and Markulf Kohlweiss23 and Mary Maller12?? and Sarah Meiklejohn1? ? ? and Ian Miers24† 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-06-22 05:17:05
152

HACL∗: A Verified Modern Cryptographic Library Jean Karim Zinzindohoué Karthikeyan Bhargavan Jonathan Protzenko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-09-01 16:02:09
    153

    Mutually Independent Commitments Moses Liskov1 , Anna Lysyanskaya1 , Silvio Micali1 , Leonid Reyzin2 , and Adam Smith1 1 Laboratory for Computer Science

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2006-12-12 19:25:24
      154

      Cryptographic Hardware and Embedded Systems (CHES) CHES 2018, Amsterdam, September 9–12, 2018 IACR Transactions on CHES (TCHES), Volume 2018, Issues 1–3 Image source: Xabier Zaldua, https://www.flickr.com/photos/zald

      Add to Reading List

      Source URL: ches.iacr.org

      Language: English - Date: 2018-03-07 03:46:16
        155

        An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation Sedat Akleylek1 , Nina Bindel2 , Johannes Buchmann2 , Juliane Krämer2 , and Giorgia Azzurra Marson2 1

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2016-02-22 10:51:14
          156

          An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2008-06-22 07:14:34
            157

            Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two Debajyoti Das Sebastian Meiser

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2018-03-02 16:52:30
              158

              A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2018-01-18 13:44:36
                159

                InterMAClib:  Beyond  Confidentiality   and  Integrity  in  Practice Torben  B.  Hansen  @n_tbh Joint  work  with   Martin  R.  Albrecht  @martinralbrecht Kenneth  G.  Paterson  @kennyog

                Add to Reading List

                Source URL: rwc.iacr.org

                Language: English - Date: 2018-01-16 11:50:28
                  160

                  Post-quantum cryptography – dealing with the fallout of physics success Daniel J. Bernstein1,2 and Tanja Lange1 1 Technische Universiteit Eindhoven

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2017-04-09 18:11:06
                    UPDATE