IACR

Results: 2241



#Item
311

Cryptography with Updates Prabhanjan Ananth UCLA Aloni Cohen

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-09-28 03:38:33
    312

    An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2008-01-30 02:51:31
      313

      Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2014-10-29 04:46:48
        314

        Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware Raghavan Kumar$ , Philipp Jovanovice , Wayne Burleson$ and Ilia Poliane $ University of Massachusetts Amherst, 01002, USA e University of Passau, 9

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-10-02 11:33:17
          315

          Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2015-06-18 08:39:54
            316

            Patchable Obfuscation Prabhanjan Ananth∗ Abhishek Jain† Amit Sahai‡

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-11-08 05:53:42
              317

              Delegating RAM Computations with Adaptive Soundness and Privacy∗ Prabhanjan Ananth† Yu-Chi Chen‡

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-10-18 18:27:40
                318

                SpaceMint: A Cryptocurrency Based on Proofs of Space∗ Sunoo Park: Albert Kwon: Georg Fuchsbauer;

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-05-12 00:44:04
                  319

                  Black-Box Separations for Differentially Private Protocols∗ Dakshita Khurana† Hemanta K. Maji† Amit Sahai†

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2014-11-23 05:56:27
                    320

                    Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis∗ Kristiyan Haralambiev † Adriana L´opez-Alt ‡

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2010-09-15 14:13:14
                      UPDATE