IACR

Results: 2241



#Item
301

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA December 2015

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-03-14 22:54:08
    302

    Fully Leakage-Resilient Signatures Elette Boyle∗ Gil Segev† Daniel Wichs‡

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2012-10-07 22:37:50
      303

      After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2011-01-06 01:53:57
        304

        Non-committing encryption from Φ-hiding Brett Hemenway Rafail Ostrovsky∗ Alon Rosen†

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-01-22 15:41:21
          305

          Functional Encryption: Decentralized and Delegatable Nishanth Chandran∗ Vipul Goyal†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2015-11-03 09:54:12
            306

            Targeted Homomorphic Attribute Based Encryption Zvika Brakerski∗ David Cash† Rotem Tsabary∗

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-07-11 11:15:24
              307

              Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows† Christof Beierle1 , Philipp Jovanovic2 , Martin M. Lauridsen3 , Gregor Leander1? , and Christian Rechberger3 1

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-01-05 09:31:19
                308

                Differing-Inputs Obfuscation and Applications Prabhanjan Ananth Dan Boneh Sanjam Garg

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2014-06-16 21:33:44
                  309

                  Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke and Feng Hao School of Computing Science, Newcastle University UK (patrick.mccorry, siamak.shahandashti, dylan.clarke, feng.ha

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2015-09-25 16:15:23
                    310

                    Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions Zvika Brakerski∗ Ilan Komargodski†

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-02-04 03:37:02
                      UPDATE