IACR

Results: 2241



#Item
221

Cryptanalysis of a Homomorphic Encryption Scheme Sonia Bogos⋆ , John Gaspoz and Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland {soniamihaela.bogos, john.gaspoz, serge.vaudenay}@epfl.ch

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-08-11 10:52:27
    222

    Simple Schnorr Multi-Signatures with Applications to Bitcoin Gregory Maxwell, Andrew Poelstra1 , Yannick Seurin2 , and Pieter Wuille1 1 Blockstream

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2018-01-15 10:45:34
      223

      Oblivious Parallel RAM and Applications Elette Boyle∗ Technion Israel Kai-Min Chung

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-08-31 14:27:41
        224

        Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives∗ Melissa Chase David Derler

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2017-03-27 07:40:58
          225

          Quasilinear-Size Zero Knowledge from Linear-Algebraic PCPs Eli Ben-Sasson Alessandro Chiesa

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-04-29 02:26:31
            226

            Bounded KDM Security from iO and OWF Antonio Marcedone1 , Rafael Pass∗1 , and abhi shelat†2 1 Cornell University, {marcedone,rafael}@cs.cornell.edu 2

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-07-09 19:50:37
              227

              Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority? Eli Ben-Sasson1 , Serge Fehr2 , and Rafail Ostrovsky3 1 Department of Computer Science, Technion, Haifa, Israel,

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2012-08-17 15:17:45
                228

                Verifiable Random Functions from Standard Assumptions Dennis Hofheinz∗and Tibor Jager† October 30, 2015 Abstract

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2015-10-30 09:14:03
                  229

                  Two-Round Man-in-the-Middle Security from LPN? David Cash1 , Eike Kitz2 , and Stefano Tessaro3 1 Rutgers University

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2015-12-21 03:11:55
                    UPDATE