IACR

Results: 2241



#Item
521

Another Look at “Provable Security” Neal Koblitz Dept. of Mathematics, BoxUniv. of Washington, Seattle, WAU.S.A.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-05-04 15:59:05
    522

    Improved Collision Attack on MD4 Yusuke Naito*, Yu Sasaki*, Noboru Kunihiro*, and Kazuo Ohta* *The University of Electro-Communications, Japan {tolucky, yu339, kunihiro, ota} @ice.uec.ac.jp Abstract

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-05-20 06:26:09
      523

      An abridged version of this paper is under submission. This is the full version. Downgrade Resilience in Key-Exchange Protocols Karthikeyan Bhargavan ∗

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-01-26 16:36:16
        524

        Lattice Reduction Algorithms: Theory and Practice Phong Q. Nguyen INRIA and ENS, D´epartement d’informatique, 45 rue d’Ulm, 75005 Paris, France. http://www.di.ens.fr/~pnguyen/

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2013-07-09 17:42:18
          525

          Scalar Blinding on Elliptic Curves with Special Structure Scott Fluhrer Cisco Systems August 11, 2015

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-08-11 15:14:11
            526

            A Fully Collusion Resistant Broadcast, Trace, and Revoke System∗ Dan Boneh† Stanford University Brent Waters‡ SRI International

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2006-08-30 21:26:58
              527

              Secure Set-based Policy Checking and Its Application to Password Registration (full version)† Changyu Dong1 and Franziskus Kiefer2 1 Department of Computer and Information Sciences

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-09-28 05:49:13
                528

                Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond Scott E. Coull Kevin P. Dyer

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2014-03-03 11:59:43
                  529Cryptography / Ciphertext indistinguishability / Semantic security / Chosen-ciphertext attack / Block cipher / Encryption / Feistel cipher / RSA / Ciphertext / Chosen-plaintext attack / Cipher / Advantage

                  On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2014-06-25 11:49:37
                  530

                  Affine Equivalence and its Application to Tightening Threshold Implementations Pascal Sasdrich, Amir Moradi, Tim G¨ uneysu Horst G¨ ortz Institute for IT Security, Ruhr-Universit¨

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-07-27 07:13:27
                    UPDATE