IACR

Results: 2241



#Item
491

A preliminary version of this paper appears in EUROCRYPTThis is the full version. New Negative Results on Differing-Inputs Obfuscation Mihir Bellare1 Igors Stepanovs2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-02-20 14:46:42
    492

    Universally Composable Security Analysis of TLS— Secure Sessions with Handshake and Record Layer Protocols∗ Sebastian Gajek1 , Mark Manulis2 , Olivier Pereira2 , Ahmad-Reza Sadeghi1 and J¨org Schwenk1 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-07-03 12:05:11
      493

      A preliminary version of this paper appears in the proceedings of EurocryptThis is the full version. Hash-Function based PRFs: AMAC and its Multi-User Security Mihir Bellare1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-03-01 14:57:53
        494Analysis of algorithms / Cache / Oblivious ram / Search engine indexing / Oblivious data structure / Keyword / Computer science / Computing

        The Fallacy of Composition of Oblivious RAM and Searchable Encryption Muhammad Naveed University of Illinois at Urbana-Champaign ABSTRACT Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-07-05 14:57:39
        495

        Cryptanalysis of White Box DES Implementations⋆ Louis Goubin, Jean-Mi hel Masereel, and Mi haël Quisquater Versailles St-Quentin-en-Yvelines University 45 avenue des Etats-Unis FVersailles Cedex

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2007-07-06 10:26:46
          496

          A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney** , Christina Garman† Matthew Green†, Nadia Heninger** , ††

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2016-04-14 04:25:54
            497

            Enhanced Privacy ID from Bilinear Pairing Ernie Brickell Jiangtao Li Intel Corporation

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2009-02-25 16:33:45
              498

              Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Hanno Böck* Aaron Zauner†‡

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2016-05-17 13:33:54
                499

                The Twin Diffie-Hellman Problem and Applications David Cash1 Eike Kiltz2 Victor Shoup3

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2009-02-10 15:46:31
                  UPDATE