IACR

Results: 2241



#Item
591

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-09-10 00:05:29
    592Cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Malleability / CramerShoup cryptosystem / Semantic security / RSA / Paillier cryptosystem / NaccacheStern cryptosystem

    Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-01-02 12:48:47
    593

    Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud Mehmet Sinan ˙Inci, Berk G¨ulmezo˘glu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar Worcester Polytechnic Institute, Worcester, MA, USA Email:{

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-09-22 14:49:47
      594

      Rich Queries on Encrypted Data: Beyond Exact Matches? Sky Faber?? Quan Nguyen‡ Stanislaw Jarecki? ? ? Marcel Rosu§

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-26 02:31:18
        595

        Random Oracles in a Quantum World ¨ ur Dagdelen2 , Marc Fischlin2 , Dan Boneh1 , Ozg¨ 3 Anja Lehmann , Christian Schaffner4 , and Mark Zhandry1 1

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2011-09-20 12:49:13
          596

          More Efficient Secure Outsourcing Methods for Bilinear Maps ? ¨ ˙ Sertkaya, and Osmanbey Uzunkol Oznur Arabacı, Mehmet Sabir Kiraz, Isa

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-10-02 07:45:09
            597

            Tweakable Blockciphers with Beyond Birthday-Bound Security Will Landecker, Thomas Shrimpton, and R. Seth Terashima Dept. of Computer Science, Portland State University {landeckw,teshrim,seth}@cs.pdx.edu

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2014-02-20 14:22:41
              598

              On the Impossibility of Cryptography with Tamperable Randomness Per Austrin∗, Kai-Min Chung†, Mohammad Mahmoody‡, Rafael Pass§, Karn Seth¶ February 11, 2014 Abstract

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2014-02-11 20:39:00
                599

                On the Myth of Metaphysical Neutrality IACR Conference – Cheryl Frank Memorial Award Lecture (Draft) JulyThis session is doing double duty as the public lecture for my book Ontology Revisited having co-won the

                Add to Reading List

                Source URL: powerscapacitiesanddispositions.files.wordpress.com

                Language: English - Date: 2015-08-07 18:04:14
                  600Cryptocurrencies / Alternative currencies / Economy / Money / Finance / Bitcoin / Blockchain / Zerocoin / Litecoin / Digital currency / Two-phase commit protocol / Ripple

                  Centrally Banked Cryptocurrencies George Danezis Sarah Meiklejohn University College London

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-12-18 04:24:19
                  UPDATE