IACR

Results: 2241



#Item
421

On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2006-02-15 04:14:19
    422

    A Provably Secure Proof-of-Stake Blockchain Protocol Aggelos Kiayias∗ University of Edinburgh Ioannis Konstantinou†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-09-12 18:43:09
      423

      Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS Kristen Dorey Nicholas Chang-Fong

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-10-17 17:40:12
        424

        Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge Felix Gr¨obert ∗

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2012-07-21 17:47:00
          425

          Efficient Padding Oracle Attacks On Cryptographic Hardware or The Million Message Attack inMessages Graham Steel joint work with R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, J. Kai-Tsay

          Add to Reading List

          Source URL: www.iacr.org

          - Date: 2012-08-21 15:40:12
            426

            Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems Stefan Dziembowski1 , Sebastian Faust2 , Gottfried Herold2 , Anthony Journault3 , Daniel Masny2 , Fran¸cois-Xavier Standaert3 . 1

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-06-03 11:21:43
              427

              Analysis of the Blockchain Protocol in Asynchronous Networks Rafael Pass∗ Cornell Tech Lior Seeman

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-05-09 21:22:18
                428

                The Moral Character of Cryptographic Work Phillip Rogaway IACR Distinguished Lecture Asiacrypt 2015

                Add to Reading List

                Source URL: web.cs.ucdavis.edu

                - Date: 2015-12-02 01:13:58
                  429

                  Robust Authenticated Encryption and the Limits of Symmetric Cryptography? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2015-09-14 09:48:53
                    430

                    Probabilistic Termination and Composability of Cryptographic Protocols∗ Ran Cohen† Sandro Coretti‡

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-07-21 09:17:49
                      UPDATE