IACR

Results: 2241



#Item
781

Generic Attacks on Feistel Schemes Jacques Patarin1,2 1 CP8 Crypto Lab, SchlumbergerSema, 36-38 rue de la Princesse, BP 45, 78430 Louveciennes Cedex, France

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-12-12 19:25:24
    782

    Geppetto: Versatile Verifiable Computation Craig Costello Microsoft Research Markulf Kohlweiss

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-11-30 18:27:56
      783

      Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL Enrico Thomae, Christopher Wolf

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2012-07-18 09:00:20
        784

        On the Generalized Linear Equivalence of Functions over Finite Fields Luca Breveglieri, Alessandra Cherubini, and Marco Macchetti Politecnico di Milano, Milan, Italy

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-09-06 02:11:50
          785

          Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 Craig Gentry1 , Jakob Jonsson2 , Jacques Stern3? , and Michael Szydlo2 1 2

          Add to Reading List

          Source URL: www.iacr.org

          Language: English - Date: 2006-12-12 19:25:24
            786

            Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2007-09-01 21:54:59
              787

              Right-Invariance: A Property for Probabilistic Analysis of Cryptography based on Infinite Groups Eonkyung Lee Dept. of Applied Mathematics, Sejong University, Seoul, Korea

              Add to Reading List

              Source URL: www.iacr.org

              Language: English - Date: 2007-09-06 02:11:51
                788

                OAEP 3-Round A Generic and Secure Asymmetric Encryption Padding Duong Hieu Phan and David Pointcheval ´ Ecole

                Add to Reading List

                Source URL: www.iacr.org

                Language: English - Date: 2007-09-06 02:11:50
                  789

                  Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk Dept. of Computing, Macquarie University, North Ryde, Australia {rons,hwang,josef}@ics.mq.

                  Add to Reading List

                  Source URL: www.iacr.org

                  Language: English - Date: 2007-09-06 02:11:53
                    790

                    Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources Michael Backes, Aniket Kate, Sebastian Meiser, and Tim Ruffing CISPA, Saarland University, Germany {backes@cs, aniket@mmci, meiser@cs, tim.ruff

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2015-04-02 11:21:02
                      UPDATE