IACR

Results: 2241



#Item
271

Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures Vipul Goyal ∗

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-03-21 15:51:32
    272

    Shorter Circuit Obfuscation in Challenging Security Models Zvika Brakerski∗ Or Dagmi∗ Abstract

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-04-27 05:37:11
      273

      Attribute-Based Encryption for Circuits Sergey Gorbunov∗ Vinod Vaikuntanathan† Hoeteck Wee‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2013-05-31 21:04:06
        274

        Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions Sandro Coretti∗†1 , Juan Garay‡2 , Martin Hirt3 , and Vassilis Zikas§†‡4 1

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-11-22 20:50:31
          275

          Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2012-11-29 11:47:05
            276

            NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson1 , Philipp Jovanovic2 and Samuel Neves3 1 Kudelski Security, Switzerland

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-11-28 08:24:01
              277

              Is extracting data the same as possessing data? Douglas R. Stinson∗ and Jalaj Upadhyay David R. Cheriton School of Computer Science University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada September 22, 2013

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2013-09-24 19:45:27
                278

                A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2014-09-17 07:10:18
                  279

                  Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-01-10 04:13:59
                    280

                    Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-11-02 14:33:31
                      UPDATE