IACR

Results: 2241



#Item
631

Identity Based (Lossy) Trapdoor Functions and Applications

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-01 11:14:59
    632

    Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security Kai-Min Chung †

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-02-05 16:08:55
      633

      Functional Encryption for Regular Languages Brent Waters University of Texas at Austin Abstract

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2012-07-10 16:49:22
        634

        Shannon Entropy versus Renyi Entropy from a Cryptographic Viewpoint ? Maciej Sk´orski ?? Cryptology and Data Security Group, University of Warsaw

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-10-08 12:33:31
          635

          Identity-Based Revocation from Subset Difference Methods under Simple Assumptions Kwangsu Lee∗ Jong Hwan Park†

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-09-22 04:31:30
            636

            1 HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network Hassan Noura, Damien Courouss´e

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-09-23 06:30:22
              637

              Guidelines for Events In Cooperation with IACR February 2014∗ 1 Introduction

              Add to Reading List

              Source URL: iacr.org

              Language: English - Date: 2014-02-28 07:19:04
                638

                Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption Amit Sahai∗, UCLA Hakan Seyalioglu†, UCLA

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2012-08-01 12:12:58
                  639

                  A Decade of Lattice Cryptography Chris Peikert1 September 26, 2015 1

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2016-02-17 22:46:42
                    640

                    When Homomorphism Becomes a Liability Zvika Brakerski∗ Abstract We show that an encryption scheme cannot have a simple decryption function and be homomorphic at the same time, even with added noise. Specifically, if a

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2012-09-01 18:54:16
                      UPDATE