IACR

Results: 2241



#Item
681

Lattice Based Cryptography for Beginners – A supplementary note to the following 1. Peikert’s Bonn Lecture Slides 2. Lyubashevsky, Peikert and Regev: A toolkit for Ring-LWE 3. Steinfeld’s Lecture Slides on multilin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-12-20 21:43:09
    682

    Eclipse Attacks on Bitcoin’s Peer-to-Peer Network ∗ Ethan Heilman∗ Alison Kendler∗ Aviv Zohar† Sharon Goldberg∗ † Hebrew University/MSR Israel

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-07-02 13:54:40
      683

      Localised Multisecret Sharing Thalia M. Laing Keith M. Martin, Information Security Group,

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-22 07:03:25
        684

        Asymmetric proof-of-work based on the Generalized Birthday problem Alex Biryukov Dmitry Khovratovich

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-10-01 06:33:22
          685

          Oblivious RAM Revisited Benny Pinkas∗ Dept. of Computer Science University of Haifa Mount Carmel, Haifa 31905, Israel

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2010-06-22 17:30:57
            686

            A Provable-Security Analysis of Intel’s Secure Key RNG Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu Abstract. We provide the first provable-secu

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-02-17 19:30:26
              687

              The leaking battery A privacy analysis of the HTML5 Battery Status API Lukasz Olejnik1 , Gunes Acar2 , Claude Castelluccia1 , and Claudia Diaz2 2

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-09-04 13:26:13
                688

                C:/Documents and Settings/cjiali/My Documents/SPN Hash/Africacrypt2012/SpnHash.dvi

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2012-07-09 03:32:18
                  689

                  Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Dor¨ oz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute {ydoroz,ashahverdi,teisenbarth,sunar}@wpi.edu

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2014-03-31 11:56:02
                    690

                    Tweak-Length Extension for Tweakable Blockciphers⋆ Kazuhiko Minematsu1 and Tetsu Iwata2 1 2

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2015-09-14 00:32:23
                      UPDATE