IACR

Results: 2241



#Item
651

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN Lei Wei1 , Christian Rechberger2 , Jian Guo3 , Hongjun Wu1 , Huaxiong Wang1 , and San Ling1 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-04-27 04:16:45
    652

    Resettable Cryptography in Constant Rounds – the Case of Zero Knowledge Yi Deng† Dengguo Feng] †

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-08-02 22:12:03
      653MISTY1 / Eurocrypt / Shamir / Dunkelman / Itai / Dinur

      Rump-Programme.txt Page 1 EC 2013 Rump Session 19:30 Aggelos Kiayias

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2013-05-28 01:20:46
      654

      Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗ Shafi Goldwasser‡

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2011-12-06 22:25:01
        655

        Tampering with the Delivery of Blocks and Transactions in Bitcoin † ˇ Arthur Gervais† , Hubert Ritzdorf† , Ghassan O. Karame‡ and Srdjan Capkun †

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-06-10 08:25:56
          656

          Billion-Gate Secure Computation with Malicious Adversaries Benjamin Kreuter University of Virginia abhi shelat

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2012-08-14 14:14:12
            657

            Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer Scott E. Coull

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2013-09-30 19:57:01
              658

              I EUROCRYPT 2000 ONLINE GUIDE Table of Contents Preface Program Committee

              Add to Reading List

              Source URL: iacr.org

              Language: English - Date: 2006-03-05 16:02:51
                659

                Information-flow control for programming on encrypted data∗ J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman April 13, 2012 Abstract Using homomorphic encryption and secure multiparty computation, cloud servers may

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2012-04-13 18:08:34
                  660

                  Concurrent Zero Knowledge in the Bounded Player Model V IPUL G OYAL Microsoft Research India

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2012-09-01 00:45:48
                    UPDATE