IACR

Results: 2241



#Item
451Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
452Cryptography / Initialization vector / Authenticated encryption / Stream cipher / Symmetric-key algorithm / Cipher / Chosen-plaintext attack / Advantage / Padding / Data Encryption Standard / Cryptographic nonce / Block cipher mode of operation

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 02:21:29
453Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-11 12:09:54
454Cryptography / Mathematics / Card shuffling / Randomness / Pseudorandom permutation / Random permutation / Shuffling / Combination / Limit of a function

Sometimes-Recurse Shuffle Almost-Random Permutations in Logarithmic Expected Time Ben Morris1 Phillip Rogaway2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-01 23:51:51
455Cryptocurrencies / Bitcoin / Computing / Ethereum / E-commerce / Network architecture / Cross-platform software / Blockchain / Solidity / Smart contract / Joseph Lubin / RootStock

Town Crier: An Authenticated Data Feed for Smart Contracts Fan Zhang1,3 Ethan Cecchetti1,3 Kyle Croman1,3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-29 23:16:47
456Mathematics / Algebraic topology / Sheaf / Negligible function

E:/Documents/Courses/Spring 2011/gc/dyn/dyn.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-06-30 14:19:02
457Cryptography / Public-key cryptography / Finite fields / Ciphertext indistinguishability / Digital signature / Oblivious transfer / Communications protocol / Random oracle / XTR / RSA / Commitment scheme / Advantage

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-06-04 01:58:11
458Computing / Computer architecture / Computer hardware / Computer memory / Central processing unit / Memory management / Virtual memory / Memory address / Memory protection / 64-bit computing / X86 / Random-access memory

Intel SGX Explained Victor Costan and Srinivas Devadas , Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-08-12 18:27:31
459Combinatorics / Order theory / Multiset / Block cipher / Permutation / Pseudorandom permutation / Path ordering / Combination / Integral / Set

Structural Evaluation by Generalized Integral Property? Yosuke Todo NTT Secure Platform Laboratories, Tokyo, Japan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-07-02 20:32:13
460Cryptography / Circuit complexity / Trapdoor function / Data Encryption Standard / Circuit / Function / Secure multi-party computation

The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-06-30 14:22:04
UPDATE