IACR

Results: 2241



#Item
511

Demystifying Incentives in the Consensus Computer Loi Luu Jason Teutsch Raghav Kulkarni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-05 03:00:10
    512Cryptocurrencies / Bitcoin / Blockchain / Universal composability / Zerocoin / Ethereum / Smart contract / Secure multi-party computation / CryptoNote / Shadow

    Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts ∗ Ahmed Kosba

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-07-21 00:02:53
    513

    Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA Jean-Luc Beuchat, Eiji Okamoto, and Teppei Yamazaki Graduate School of Systems and Information Engineering University of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-09-16 01:29:35
      514

      SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider, Peter Schwabe4 , and Zoo

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-02-02 09:15:08
        515

        Secure Proxy Signature Schemes for Delegation of Signing Rights A LEXANDRA B OLDYREVA ∗ A DRIANA PALACIO †

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2008-02-03 18:39:33
          516

          Security and Privacy Issues in E-passports Ari Juels∗, David Molnar†, and David Wagner‡ Abstract are based on guidelines issued by the International Civil

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2005-09-18 15:46:13
            517Cryptography / Stream ciphers / RC4 / Keystream / Fluhrer /  Mantin and Shamir attack / Distinguishing attack

            Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout1 , Sean Murphy2 , Kenneth G. Paterson2 , and Thyla van der Merwe2 1

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2016-02-22 02:10:52
            518Cryptography / E-commerce / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Modular exponentiation / Ciphertext / Cryptanalysis / BlumGoldwasser cryptosystem / Rabin cryptosystem

            Bug Attacks Eli Biham1 Yaniv Carmeli1 Adi Shamir2

            Add to Reading List

            Source URL: iacr.org

            Language: English - Date: 2010-11-05 17:58:40
            519Algebra / Abstract algebra / Analytic number theory / Invariant theory / Algebraic surfaces / Algebraic curves / Moduli space / Moduli theory / Modular form / Abelian variety / Elliptic curve / Complex multiplication

            Computing genus 2 curves from invariants on the Hilbert moduli space Journal of Number Theory, Special Issue on Elliptic Curve Cryptography http://eprint.iacr.org

            Add to Reading List

            Source URL: 2010.eccworkshop.org

            Language: English - Date: 2010-10-26 20:15:50
            UPDATE