IACR

Results: 2241



#Item
461Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
462Cryptography / Ciphertext indistinguishability / Probabilistic encryption / Authenticated encryption / Cryptosystem / RSA / Encryption / Deterministic encryption / Block cipher mode of operation / Public-key cryptography / Ciphertext / Cipher

Security of Symmetric Encryption against Mass Surveillance Mihir Bellare1 , Kenneth G. Paterson2 , and Phillip Rogaway3 1 Dept. of Computer Science and Engineering, University of California San Diego, USA. cseweb.ucsd.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-08-24 18:12:50
463ElGamal encryption / Chosen-ciphertext attack / Probabilistic encryption / RSA / CramerShoup cryptosystem / Authenticated encryption / Adaptive chosen-ciphertext attack / Advantage / Chosen-plaintext attack / Semantic security / Ciphertext indistinguishability

Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-05-02 04:08:26
464Lattice-based cryptography / Post-quantum cryptography / NTRU / NTRUEncrypt

Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-02-22 01:46:08
465Cryptography / Integer factorization algorithms / E-commerce / RSA / Key management / Prime number / Key / Factorization / Public-key cryptography / Trial division / Greatest common divisor / Hardware random number generator

Factoring RSA keys from certified smart cards: Coppersmith in the wild Daniel J. Bernstein1,2 , Yun-An Chang3 , Chen-Mou Cheng3 , Li-Ping Chou4 , Nadia Heninger5 , Tanja Lange2 , and Nicko van Someren6 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-16 19:47:39
466Homeomorphisms / Homomorphic encryption / Public-key cryptography / Learning with errors / Spectral theory

FHE Circuit Privacy Almost For Free Florian Bourse∗ , Rafa¨el Del Pino† , Michele Minelli‡ , and Hoeteck Wee§ ENS, CNRS, INRIA, and PSL Research University, Paris, France {fbourse,delpino,minelli,wee}@di.ens.fr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-13 09:13:32
467Cryptography / Public-key cryptography / Key management / Digital signature / Post-quantum cryptography / Key / Elliptic Curve Digital Signature Algorithm / RSA / Cryptographic hash function / Merkle signature scheme / Lamport signature

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-04-06 13:04:46
468Pseudorandom number generators / Cryptography / Pseudorandomness / Randomness / Information theory / Random number generation / Dual EC DRBG / Fortuna / Pseudorandom generator / RdRand / RSA Security / PRGS

The proceedings version of this paper appears in CRYPTOThis is a preliminary full version. Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele1 , Kenneth G. Pat

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-03 14:14:07
469Randomness / Formal sciences / Physical unclonable function / Information theory

ˇ Publications by Boris Skori´ c ˇ [1] B. Skori´ c. Unclonable encryption revisited: 4x2=8, 2015. https://eprint.iacr.org.

Add to Reading List

Source URL: security1.win.tue.nl

Language: English - Date: 2016-01-03 03:15:37
470Public-key cryptography / Cryptography / Financial cryptography / Digital signature / Blind signature / David Chaum / Commitment scheme / Proof of knowledge / Blinding / Zero-knowledge proof / FiatShamir heuristic / Cryptographic protocol

Anonymous Credentials Light Foteini Baldimtsi, Anna Lysyanskaya foteini, Computer Science Department, Brown University Abstract. We define and propose an efficient and provably secure construction of bl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-21 23:04:44
UPDATE