IACR

Results: 2241



#Item
711

Surreptitiously Weakening Cryptographic Systems Bruce Schneier1 1 Matthew Fredrikson2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-09 23:53:03
    712

    Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2007-08-31 13:50:35
      713

      Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking Dwaine Clarke? , Srinivas Devadas, Marten van Dijk?? , Blaise Gassend, G. Edward Suh MIT Computer Science and Artificial Intelligence

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2007-09-01 21:55:05
        714

        Efficient Oblivious Transfer in the Bounded-Storage Model Dowon Hong, Ku-Young Chang, and Heuisu Ryu Information Security Research Division, ETRI 161 Gajeong-Dong, Yuseong-Gu, Daejeon, , KOREA {dwhong,jang1090,hsr

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-08-31 13:50:32
          715

          Small Public Keys and Fast Verication for Multivariate Quadratic Public Key Systems 1 2

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2011-06-03 05:29:32
            716

            Provably Authenticated Group Diffie-Hellman Key Exchange – The Dynamic Case Emmanuel Bresson1 , Olivier Chevassut2,3? , and David Pointcheval1 ´ Ecole Normale Sup´erieure, 75230 Paris Cedex 05, France

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2006-12-12 19:25:24
              717

              New Parallel Domain Extenders for UOWHF Wonil Lee1 , Donghoon Chang1 , Sangjin Lee1 , and Soohak Sung2 1 2

              Add to Reading List

              Source URL: www.iacr.org

              Language: English - Date: 2007-09-01 21:55:05
                718

                PDF Document

                Add to Reading List

                Source URL: www.iacr.org

                Language: Vietnamese - Date: 2005-03-18 09:06:22
                  719

                  Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications Benoˆıt Libert1 , Thomas Peters2 , Marc Joye3 , and Moti Yung4 1 Ecole Normale Sup´erieure de Lyon, Laborat

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2016-01-11 07:41:43
                    720

                    Cryptanalysis of 3-pass HAVAL? Bart Van Rompay, Alex Biryukov, Bart Preneel?? , and Joos Vandewalle Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {bart.vanr

                    Add to Reading List

                    Source URL: www.iacr.org

                    Language: English - Date: 2007-09-01 21:55:06
                      UPDATE