IACR

Results: 2241



#Item
581

CANS 2011 The 10th International Conference on Cryptology and Network Security In Cooperation With IACR December 10-12, 2011, Sanya, China - Call for Participation (http://www.infosec.sdu.edu.cn/cans2011/)

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2015-09-17 19:41:56
    582

    Comparison of cube attacks over different vector spaces Richard Winter1 , Ana Salagean1 , and Raphael C.-W. Phan2 1 Department of Computer Science, Loughborough University, Loughborough, UK

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-09-14 11:55:10
      583

      Cryptanalysis of the New CLT Multilinear Maps Jung Hee Cheon, Changmin Lee, Hansol Ryu Seoul National University (SNU), Republic of Korea Abstract. Multilinear maps have many cryptographic applications. The first candida

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-01-14 22:19:43
        584

        c IACRThis article is the final version submitted by the authors to the IACR and to Springer Verlag. The version published by Springer-Verlag is available at DOI: Anonymous Transfera

        Add to Reading List

        Source URL: www.di.ens.fr

        Language: English - Date: 2015-09-02 07:08:21
          585

          On the Diffusion Property of Iterated Functions Jian Liu1 ? , Sihem Mesnager2 , and Lusheng Chen3 1 School of Computer Software, Tianjin University, Tianjin, P. R. China and CNRS, UMR 7539 LAGA, Paris, France

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-09-14 05:03:40
            586

            New Techniques for Electronic Voting Alan Szepieniec and Bart Preneel ESAT/COSIC, KU Leuven and iMinds, Belgium

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-08-13 21:41:08
              587

              1 Exploiting the Order of Multiplier Operands: a Low-Cost Approach for HCCA Resistance Poulami Das, Debapriya Basu Roy, and Debdeep Mukhopadhyay

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-12-10 08:26:32
                588

                Reconsidering Generic Composition Chanathip Namprempre1 and Phillip Rogaway2 and Thomas Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand 2

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2014-03-20 00:16:06
                  589

                  Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN Danping Shi1,2,3 , Lei Hu1,2? , Siwei Sun1,2 , Ling Song1,2 1 State Key Laboratory of Information Security, Institute of Information Engineering,

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-11-21 00:31:39
                    590

                    End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol? Aydin Aysu1 , Ege Gulcan1 , Daisuke Moriyama2 , Patrick Schaumont1 , and Moti Yung3 3

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2015-11-11 01:25:32
                      UPDATE