IACR

Results: 2241



#Item
411

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification Stefan Dziembowski? , Sebastian Faust?? , and Fran¸cois-Xavier Standaert? ? ? 1 University of Warsaw

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-10-22 11:32:15
    412

    A preliminary version of this paper appears in the proceedings of ASIACRYPTThis is the full version. NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion Mihir Bellare1

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-09-08 13:17:49
      413

      Zerocash: Decentralized Anonymous Payments from Bitcoin (extended version) Eli Ben-Sasson∗ Alessandro Chiesa†

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2014-05-19 02:48:53
        414

        NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-03-14 12:16:03
          415

          Surreptitiously Weakening Cryptographic Systems Bruce Schneier1 1 Matthew Fredrikson2

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2015-02-09 23:53:03
            416

            The Security of NTP’s Datagram Protocol Aanchal Malhotra∗ , Matthew Van Gundy† , Mayank Varia∗ , Haydn Kennedy∗ , Jonathan Gardner† , Sharon Goldberg∗ ∗ Boston University † Cisco (ASIG) Abstract—For d

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-10-23 13:07:09
              417

              Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS Kristen Dorey Nicholas Chang-Fong

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-10-17 17:40:12
                418

                Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations Andrey Bogdanov1 , Lars R. Knudsen2 , Gregor Leander2 , Francois-Xavier Standaert3 , John Steinberger4 , and Elmar Tis

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2012-01-30 04:16:33
                  419

                  Efficient compression of SIDH public keys Craig Costello1 , David Jao2? , Patrick Longa1 , Michael Naehrig1 , Joost Renes3?? , and David Urbanik2? 1 2

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-10-04 21:24:23
                    420

                    NSEC5: Provably Preventing DNSSEC Zone Enumeration Sharon Goldberg∗ , Moni Naor† , Dimitrios Papadopoulos∗ , Leonid Reyzin∗ , Sachin Vasant∗ and Asaf Ziv† ∗ Boston University, Department of Computer Scienc

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2014-12-05 19:15:38
                      UPDATE