IACR

Results: 2241



#Item
571

Dynamic Provable Data Possession C. Chris Erway Alptekin K¨upc¸u¨ Charalampos Papamanthou

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-11-29 23:55:56
    572

    Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP Zvika Brakerski∗ Abstract We present a new tensoring technique for LWE-based fully homomorphic encryption. While

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-05-18 19:13:22
      573

      Sandy2x: New Curve25519 Speed Records Tung Chou Department of Mathematics and Computer Science Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB Eindhoven, the Netherlands

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-30 15:11:08
        574

        CLOC: Authenticated Encryption for Short Input⋆ Tetsu Iwata1 , Kazuhiko Minematsu2 , Jian Guo3 , and Sumio Morioka4 1 Nagoya University, Japan, NEC Corporation, Japan,

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2014-03-01 01:27:49
          575Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

          A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-02-17 07:57:12
          576

          Tampering with the Delivery of Blocks and Transactions in Bitcoin † ˇ Arthur Gervais† , Hubert Ritzdorf† , Ghassan O. Karame‡ and Srdjan Capkun †

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-06-10 08:25:56
            577

            Unaligned Rebound Attack: Application to Keccak Alexandre Duc1,∗ , Jian Guo2,† , Thomas Peyrin3,‡ , and Lei Wei3,§ 1 Ecole Polytechnique F´ed´erale de Lausanne, Switzerland

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2012-04-19 04:50:18
              578

              Resettable Statistical Zero Knowledge Sanjam Garg1 , Rafail Ostrovsky1 , Ivan Visconti?2 , and Akshay Wadia1 1 2

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2011-08-21 17:07:55
                579

                Using Tweaks To Design Fault Resistant Ciphers Sikhar Patranabis, Debapriya Basu Roy and Debdeep Mukhopadhyay Department of Computer Science and Engg. IIT Kharagpur, India {sikhar.patranabis, deb.basu.roy, debdeep}@cse.i

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-09-24 02:49:04
                  580

                  1 A Provably Secure Short Signature Scheme from Coding Theory Maryam Rajabzadeh Asaar∗ , Mahmoud Salmasizadeh∗ , Mohammad Reza Aref † Research Institute (Center), Sharif University of Technology, Tehran, Iran

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-09-28 15:17:42
                    UPDATE