IACR

Results: 2241



#Item
481

Demystifying Incentives in the Consensus Computer Loi Luu Jason Teutsch Raghav Kulkarni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-05 03:00:10
    482

    On the Security of RSA Encryption in TLS Jakob Jonsson and Burton S. Kaliski Jr. RSA Laboratories, 20 Crosby Drive, Bedford, MA 01730, USA {jjonsson, bkaliski}@rsasecurity.com Abstract. We show that the security of the

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2007-08-31 12:21:24
      483

      Honey Encryption Beyond Message Recovery Security ∗ Joseph Jaeger† Thomas Ristenpart‡ Qiang Tang§

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-02-23 03:13:51
        484

        Constants Count: Practical Improvements to Oblivious RAM Ling Ren MIT Christopher Fletcher MIT

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English
          485

          Attacking the Network Time Protocol Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, and Sharon Goldberg Boston University, Department of Computer Science {aanchal4, icohen93, ebrakke}@bu.edu, Abstract—W

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2016-01-07 10:29:38
            486Health / Medicine / Clinical medicine / Cancer organizations / International Agency for Research on Cancer / World Health Organization / Cancer registry / IACR / Epidemiology of cancer

            SHARON WHELANSharon was born in London England inAfter completing an Arts degree at Sussex University, she trained as a secretary, and it was in this capacity that she was recruited to join the young I

            Add to Reading List

            Source URL: www.iacr.com.fr

            Language: English - Date: 2016-04-15 04:39:52
            487

            Oblivious RAM with O((log N )3) Worst-Case Cost Elaine Shi PARC/UC Berkeley T-H. Hubert Chan HKU

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2011-11-29 00:17:58
              488

              Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound Xiao Shaun Wang University of Maryland

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-05-15 12:35:55
                489

                White-Box Security Notions for Symmetric Encryption Schemes? C´ecile Delerabl´ee1 , Tancr`ede Lepoint1,2 , Pascal Paillier1 , and Matthieu Rivain1 1 CryptoExperts, 41 boulevard des Capucines, 75002 Paris, France

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2013-08-22 15:08:37
                  490Software / Computing / Internet privacy / Cross-platform software / Cloud clients / Portable software / Web programming / HTTP cookie / Evercookie / Firefox / Google Chrome / Mozilla

                  The leaking battery A privacy analysis of the HTML5 Battery Status API Lukasz Olejnik1 , Gunes Acar2 , Claude Castelluccia1 , and Claudia Diaz2 2

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-09-04 13:26:13
                  UPDATE