IACR

Results: 2241



#Item
561

Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp? Yi-Ruei Chen, Shiuan-Tzuo Shen, and Wen-Guey Tzeng Department of Computer Science, National Chiao Tung University, Taiwan yrchen.cs98g@nctu.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-28 09:47:05
    562

    Worst-Case to Average-Case Reductions for Module Lattices Adeline Langlois and Damien Stehlé Laboratoire LIP (U. Lyon, CNRS, ENS Lyon, INRIA, UCBL), 46 Allée d’Italie, 69364 Lyon Cedex 07, France Abstract. Most latt

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-08-15 01:45:38
      563

      SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS THUONG T. DANG 1 , TRI T. TON 2 , VAN H. DANG 1 , THUC D. NGUYEN 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-10-04 14:42:14
        564

        Microsoft PowerPoint - IACR_short_march07.ppt

        Add to Reading List

        Source URL: fse2007.uni.lu

        - Date: 2007-05-23 09:25:58
          565

          A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer∗ Shota Goto1 , and Junji Shikata1,2 1 2

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-09-30 04:26:35
            566

            Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol I. Damg˚ ard1 , M. Keller2 , E. Larraia2 , C. Miles2 , and N.P. Smart2 1

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2012-05-21 06:49:04
              567

              On the security margin of MAC striping Thomas Eisenbarth1 , Aaron Meyerowitz2 , and Rainer Steinwandt2 1 Worcester Polytechnic Institute (WPI), 100 Institute Rd, Worcester, MA 01609

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-02-05 17:20:17
                568

                A Privacy Preserving Improvement for SRTA in Telecare Systems Seyed Salman Sajjadi Ghaemmaghami1, Mahtab Mirmohseni2, Afrooz Haghbin1 Abstract Radio Frequency Identification (RFID) is a modern

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-10-13 02:23:41
                  569

                  Leakage Assessment Methodology – a clear roadmap for side-channel evaluations – Tobias Schneider and Amir Moradi Horst G¨ ortz Institute for IT-Security, Ruhr-Universit¨ at Bochum, Germany

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-06-15 23:48:26
                    570

                    Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications Andrew Miller University of Maryland

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2015-05-18 16:43:29
                      UPDATE