IACR

Results: 2241



#Item
621

The  11th  Theory  of  Cryptography  Conference   TCC  2014   February  24-­‐26,  2014  San  Diego,  CA,  USA  

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-12-20 15:13:53
    622

    A Leakage Resilient MAC Daniel P. Martin1 , Elisabeth Oswald1 , Martijn Stam1 , and Marcin W´ojcik2? 1 Department of Computer Science, University of Bristol {dan.martin,elisabeth.oswald,martijn.stam}@bris.ac.uk 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-09-09 08:19:57
      623

      Masking Large Keys in Hardware: A Masked Implementation of McEliece Cong Chen1 , Thomas Eisenbarth1 , Ingo von Maurich2 , and Rainer Steinwandt3 1 Worcester Polytechnic Institute, Worcester, MA, USA

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-22 11:03:07
        624

        This is the full version of the extended abstract which appears in Proceedings of the Cryptographers’ Track at the RSA Conference (CT-RSAShort Structure-Preserving Signatures Essam Ghadafi∗ University College

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-11-25 12:09:45
          625

          Quantum-Secure Message Authentication Codes Dan Boneh Mark Zhandry Stanford University

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2013-09-11 11:51:07
            626

            Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo1 , Yu Sasaki2 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore. NTT Secure Platform Laboratories, Japan.

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-02-23 10:32:52
              627

              Security Against Related Randomness Attacks via Reconstructive Extractors? Kenneth G. Paterson1 , Jacob C. N. Schuldt2 , Dale L. Sibborn1 , and Hoeteck Wee3 1

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-09-14 13:15:43
                628

                Cryptanalysis of Provably Secure Certificateless Short Signature Scheme Jayaprakash Kar Information Security Research Group Department of Information Systems Faculty of Computing & Information Technology

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-09-24 03:53:31
                  629

                  Enhanced Lattice-Based Signatures on Reconfigurable Hardware Extended Version Thomas P¨ oppelmann1 , L´eo Ducas2 , and Tim G¨ uneysu1 1

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-02-20 10:04:41
                    630

                    On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives Mridul Nandi and Tapas Pandit Indian Statistical Institute, Kolkata ,

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2015-10-01 09:25:47
                      UPDATE