IACR

Results: 2241



#Item
331

Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov∗ Moni Naor†

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-03-07 02:09:32
    332

    Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette1 , Kevin Lewi2 , Stephen A. Weis3 , and David J. Wu2 1 Rose-Hulman Institute of Technology 2

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-02-05 16:46:30
      333

      An Optimally Fair Coin Toss Tal Moran∗ Moni Naor† Gil Segev‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-01-04 03:07:02
        334

        Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar$ , Philipp Jovanovice and Ilia Poliane $ University of Massachusetts, 01002 USA

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-10-02 11:24:39
          335

          Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps Prabhanjan Ananth∗

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-11-22 03:25:27
            336

            Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh∗ Ananth Raghunathan†

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2014-09-15 06:13:04
              337

              Indistinguishability Obfuscation from Compact Functional Encryption Prabhanjan Ananth∗ Abhishek Jain†

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-09-02 18:52:48
                338

                Key-collisions in (EC)DSA: Attacking Non-repudiation* Tomáš Rosa http://crypto.hyperlink.cz, email: Abstract. A new kind of attack on the non-repudiation property of digital signature schemes is present

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2004-01-10 08:28:36
                  339

                  An extended abstract of this paper appears at PKCEfficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys (Full Version) Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Sc

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-02-11 11:52:26
                    340

                    Secure Physical Computation using Disposable Circuits Ben A. Fisch1 , Daniel Freund2 , and Moni Naor?3 1

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2015-03-10 04:46:39
                      UPDATE