IACR

Results: 2241



#Item
541

Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority? Eli Ben-Sasson1 , Serge Fehr2 , and Rafail Ostrovsky3 1 Department of Computer Science, Technion, Haifa, Israel,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-17 15:17:45
    542

    PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service Hung Dang, Tien Tuan Anh Dinh, Ee-Chien Chang, Beng Chin Ooi Prateek Saxena, Shruti Tople School of Computing, National Uni

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-10-02 00:46:53
      543

      Rogue Decryption Failures: Reconciling AE Robustness Notions Guy Barwell, Daniel Page, and Martijn Stam Department of Computer Science, University of Bristol, Bristol, BS8 1UB, United Kingdom. {guy.barwell, daniel.page,

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-14 18:09:22
        544

        Fully Homomorphic Encryption without Bootstrapping Zvika Brakerski Weizmann Institute of Science Craig Gentry∗ IBM T.J. Watson Research Center

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2011-08-11 02:21:08
          545

          Distributed Cryptography Based on the Proofs of Work? Marcin Andrychowicz?? and Stefan Dziembowski? ? ? University of Warsaw Abstract. Motivated by the recent success of Bitcoin we study the question of constructing dist

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2014-12-17 15:24:21
            546

            Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2007-06-12 08:54:07
              547

              Proofs of Ownership in Remote Storage Systems ∗ Shai Halevi1 , Danny Harnik2 , Benny Pinkas3 , and Alexandra Shulman-Peleg2 1 IBM T. J. Watson Research Center, 2 IBM Haifa Research Lab, 3 Bar Ilan University

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2011-08-11 09:53:08
                548

                Computing on Authenticated Data Jae Hyun Ahn Johns Hopkins University Susan Hohenberger‡ Johns Hopkins University

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2011-12-26 14:38:05
                  549

                  IACR Guidelines for General Chairs August 2015∗ Dear General Chair, The purpose of this document is to help you smoothly run a successful conference or workshop, and help in managing the IACR finances and membership. T

                  Add to Reading List

                  Source URL: www.iacr.org

                  Language: English - Date: 2015-12-01 21:51:12
                    550

                    Cryptanalysis of Zorro Jian Guo, Ivica Nikoli´c, Thomas Peyrin, and Lei Wang Nanyang Technological University, Singapore , {inikolic,thomas.peyrin, wang.lei}@ntu.edu.sg Abstract. At CHES 2013 was prese

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2013-11-01 05:10:24
                      UPDATE