IACR

Results: 2241



#Item
431

Reconsidering Generic Composition Chanathip Namprempre1 and Phillip Rogaway2 and Thomas Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand 2

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2014-03-20 00:16:06
    432

    Network-Hiding Communication and Applications to Multi-Party Protocols Martin Hirt1 , Ueli Maurer1 , Daniel Tschudi1? , and Vassilis Zikas2?? 1 ETH Zurich {hirt, maurer, tschudid}@inf.ethz.ch

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-06-02 12:47:24
      433

      Cryptanalysis of the Bluetooth E0 Cipher using OBDD’s Yaniv Shaked and Avishai Wool School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978, ISRAEL ,

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2006-03-27 04:46:14
        434

        Keeping Denial-of-Service Attackers in the Dark∗ Gal Badishi† Amir Herzberg‡ Idit Keidar†

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2005-08-31 07:02:16
          435

          Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field Jintai Ding1 , Jason E. Gower1 and Dieter S. Schmidt2 Department of Mathematical Sciences1 Department of Electrical & Computer

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2006-03-12 00:03:32
            436

            Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer∗ Victor Shoup†

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2001-12-12 07:16:30
              437

              Cache Attacks and Countermeasures: the Case of AESDag Arne Osvik1 , Adi Shamir2 and Eran Tromer2 2

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2005-08-15 11:30:57
                438

                This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

                Add to Reading List

                Source URL: www.normalesup.org

                - Date: 2015-02-21 09:51:42
                  439

                  On the Security of One-Witness Blind Signature Schemes Foteini Baldimtsi and Anna Lysyanskaya foteini, Computer Science Department, Brown University Abstract. Blind signatures have proved an essential b

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2013-05-21 23:15:07
                    440

                    On the (Im)possibility of Obfuscating Programs (Extended Abstract) Boaz Barak1 , Oded Goldreich1 , Rusell Impagliazzo2 , Steven Rudich3 , Amit Sahai4 , Salil Vadhan5 , and Ke Yang3 1

                    Add to Reading List

                    Source URL: www.iacr.org

                    - Date: 2006-11-25 00:57:23
                      UPDATE