IACR

Results: 2241



#Item
171

Path ORAM: An Extremely Simple Oblivious RAM Protocol Emil Stefanov† , Marten van Dijk‡ , Elaine Shi∗ , T-H. Hubert Chan∗∗ , Christopher Fletcher◦ , Ling Ren◦ , Xiangyao Yu◦ , Srinivas Devadas◦ †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-13 20:03:37
    172

    “Oops, I did it again” – Security of One-Time Signatures under Two-Message Attacks Leon Groot Bruinderink and Andreas Hülsing Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O.

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2017-09-25 03:25:51
      173

      The Honey Badger of BFT Protocols Andrew Miller Yu Xia Kyle Croman Tsinghua University University of Illinois, Urbana-Champaign

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-10-24 17:59:45
        174Cryptocurrencies / Alternative currencies / Economy / Money / Exonumia / Digital currencies / Bitcoin / Private currencies / Zerocoin protocol / Zcash / Money laundering / Zero-knowledge proof

        Accountable Privacy for Decentralized Anonymous Payments Christina Garman∗ Matthew Green∗ Ian Miers∗

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2016-06-26 21:14:20
        175Voting / Politics / Electronic voting / Election technology / Electoral fraud / Punchscan / Scantegrity / Voting machine / Ballot / Bingo voting / End-to-end auditable voting systems / Voter-verified paper audit trail

        DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities? Siamak F. Shahandashti and Feng Hao School of Computing Science, Newcastle University, UK {siamak.shahandashti,feng.hao}@ncl.ac.uk

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2016-07-11 13:13:34
        176Cryptography / Computing / Internet / Internet protocols / Transport Layer Security / Secure communication / Internet Standards / QUIC / Transmission Control Protocol / Forward secrecy

        Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ January 12, 2018—RWC 2018, Zurich, Switzerland

        Add to Reading List

        Source URL: rwc.iacr.org

        Language: English - Date: 2018-01-16 11:57:21
        177Algebra / Mathematics / Linear algebra / Vector space / Linear span / Linear combination / Basis / IP / Linear independence / Multivariate random variable / Dual space / Euclidean vector

        Quadratic Span Programs and Succinct NIZKs without PCPs

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2012-06-18 18:37:11
        178Cryptocurrencies / Cryptography / Blockchain / Pseudorandom permutation / Cardano / Bitcoin / Public-key cryptography / Proof-of-stake / Digital signature / Ethereum / Verifiable random function / Peercoin

        Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain Bernardo David? , Peter Gaˇzi?? , Aggelos Kiayias? ? ? , and Alexander Russell† November 14, 2017 Abstract. We present “Ouroboros Pr

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2017-11-14 19:18:35
        179Cryptocurrencies / Bitcoin / Blockchains / Alternative currencies / Money / Economy / Financial technology / Digital currencies / BitPay / RootStock / Coinbase / Economics of bitcoin

        Refund attacks on Bitcoin’s Payment Protocol Patrick McCorry, Siamak F. Shahandashti, Feng Hao School of Computing Science, Newcastle University UK (patrick.mccorry, siamak.shahandashti, feng.hao)@ncl.ac.uk Abstract.

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2016-01-11 04:15:05
        180Computer hardware / Computer architecture / Computer security / X86 architecture / Side-channel attacks / Computing / Spectre / Meltdown / CPU cache / Out-of-order execution / Speculative Store Bypass

        Spectre and Meltdown: Data leaks during speculative execution Speaker: Jann Horn (Google Project Zero) Paul Kocher (independent) Daniel Genkin (University of Pennsylvania and

        Add to Reading List

        Source URL: rwc.iacr.org

        Language: English - Date: 2018-01-18 01:49:18
        UPDATE