IACR

Results: 2241



#Item
161Algebra / Abstract algebra / Lie groups / Non-associative algebras / XTR / Mutation / Spectral theory

Full version of an extended abstract published in AsiacryptD´ej`a Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions Melissa Chase Microsoft Research Redmond

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-08-30 11:31:59
162Cryptocurrencies / Blockchains / Ethereum / Concurrent computing / Distributed computing / Cross-platform software / Computing / Bitcoin / Smart contract / RootStock / Helios Voting / The DAO

A Smart Contract for Boardroom Voting with Maximum Voter Privacy Patrick McCorry, Siamak F. Shahandashti and Feng Hao School of Computing Science, Newcastle University UK (patrick.mccorry, siamak.shahandashti, feng.hao)@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-02-10 17:00:24
163

Rounded Gaussians Fast and Secure Constant-Time Sampling for Lattice-Based Crypto Andreas H¨ ulsing, Tanja Lange, Kit Smeets Department of Mathematics and Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-10-16 08:15:31
    164

    Towards practical key exchange from ordinary isogeny graphs Luca De Feo1,3[0000−0002−9321−0773] , Jean Kieffer2 , and Benjamin Smith3 1 3

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-05-21 13:36:52
      165

      Practical Cryptanalysis of Json Web Token and Galois Counter Mode’s Implementations Quan Nguyen () Google Information Security Engineer (ISE) My Job

      Add to Reading List

      Source URL: rwc.iacr.org

      Language: English - Date: 2017-05-31 03:05:40
        166

        1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2004-12-06 19:52:41
          167Cryptography / Block ciphers / Format-preserving encryption / Advanced Encryption Standard / Cipher / FPE

          Breaking The FF3 FormatPreserving Encryption Standard Over Small Domains F. Betül Durak Serge Vaudenay

          Add to Reading List

          Source URL: rwc.iacr.org

          Language: English - Date: 2018-01-13 06:28:10
          168

          The elliptic curve discrete logarithm problem and equivalent hard problems for elliptic divisibility sequences Kristin E. Lauter1 and Katherine E. Stange2,? 1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2008-08-04 09:38:55
            169

            Type-Based Verification of Electronic Voting Protocols Véronique Cortier1 , Fabienne Eigner2 , Steve Kremer1 , Matteo Maffei2 , and Cyrille Wiedling3 1 LORIA, CNRS & INRIA & University of Lorraine, France

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-01-15 13:48:11
              170

              Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels Thomas Ristenpart

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2014-02-28 19:09:23
                UPDATE