IACR

Results: 2241



#Item
641

Lattice-based Group Signature Scheme with Verifier-local Revocation Adeline Langlois1 , San Ling2 , Khoa Nguyen2 , Huaxiong Wang2 ´ Ecole Normale Sup´erieure de Lyon,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-11 08:32:21
    642

    Private Processing of Outsourced Network Functions: Feasibility and Constructions∗ Luca Melis Hassan Jameel Asghar

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-01-24 19:12:51
      643

      Robust Authenticated Encryption and the Limits of Symmetric Cryptography? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-14 09:48:53
        644

        Form% Use this form to book a hotel through Dudek Tour and Travel service. Always include the delegate information below. (852&5<370D\:DUVDZ3RODQG

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2003-02-26 17:25:58
          645

          Position-Based Quantum Cryptography: Impossibility and Constructions Harry Buhrman∗ Vipul Goyal§ Nishanth Chandran†

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2010-12-12 14:30:04
            646

            MI-T-HFE, a New Multivariate Signature Scheme Wenbin Zhang and Chik How Tan Temasek Laboratories National University of Singapore and

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-09-14 02:45:55
              647

              Secrecy and independence for election schemes Ben Smyth Mathematical and Algorithmic Sciences Lab, Huawei Technologies Co. Ltd., France October 4, 2015 Abstract

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-10-04 12:53:35
                648

                A conference version of part of this work appeared at the proceedings of ISITCommitment and Oblivious Transfer in the Bounded Storage Model with Errors Rafael Dowsley1

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-09-30 08:45:56
                  649

                  Secure Association for the Internet of Things Almog Benin Sivan Toledo

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-09-25 17:42:24
                    650

                    One-key Double-Sum MAC with Beyond-Birthday Security Nilanjan Datta1 , Avijit Dutta1 , Mridul Nandi1 , Goutam Paul1 , Liting Zhang23 1 Indian Statistical Institute, Kolkata

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2016-02-11 07:39:20
                      UPDATE