IACR

Results: 2241



#Item
791

Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity∗ Emiliano De Cristofaro and Gene Tsudik University of California, Irvine {edecrist,gts}@ics.uci.edu Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-04 17:45:58
    792

    Elliptic Curve Cryptography in Practice Joppe W. Bos1 , J. Alex Halderman2 , Nadia Heninger3 , Jonathan Moore, Michael Naehrig1 , and Eric Wustrow2 1 Microsoft Research

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-12-02 05:21:30
      793

      Efficient Traitor Tracing Algorithms using List Decoding Alice Silverberg1? , Jessica Staddon2?? , and Judy L. Walker3? ? ? 1 Department of Mathematics

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2006-12-12 19:25:24
        794

        Time-Lock Puzzles In the Random Oracle Model Mohammad Mahmoody, Tal Moran, Salil Vadhan Time-Lock Puzzles

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2011-08-23 13:41:38
          795Computational complexity theory / Applied mathematics / Cryptography / Mathematics / Message authentication codes / Cryptographic hash functions / VEST

          A New Approach to Practical Active-Secure Two-Party Computation 1 1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2012-02-14 09:50:59
          796Random oracle / Relational database management systems / Cross-platform software / Oracle Database / Cryptography / Software / Cryptographic hash functions

          Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

          Add to Reading List

          Source URL: www.easycrypt.info

          Language: English - Date: 2015-06-04 11:02:41
          797Biloxi /  Mississippi / Guilford Young College / Gulfport /  Mississippi / Regatta / Mississippi / Sports in Mississippi / Biloxi Yacht Club

          MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions (Full Version) Tore Kasper Frederiksen1 , Thomas Pelle Jakobsen1 , Jesper Buus Nielsen1 , Peter Sebastian Nordholt1 , and Claudio Orlandi1 ?

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2013-04-29 05:32:11
          798Macroeconomics / Electronic press kit / Money / Money supply / Mathematical proof / Cryptography / Economics / Ciphertext indistinguishability

          IACR School on Computer-Aided Cryptography

          Add to Reading List

          Source URL: www.easycrypt.info

          Language: English - Date: 2015-06-01 12:29:59
          799

          12th IACR International Workshop on Practice and Theory in Public Key Cryptography (PKCMarch 18-20, 2009, Irvine, CA, USA Conference Chairs:

          Add to Reading List

          Source URL: www.iacr.org

          Language: English - Date: 2008-10-07 14:19:05
            800

            Using Bleichenbacher’s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA Elke De Mulder1 , Michael Hutter1,2 * , Mark E. Marson1 , and Peter Pearson1 1

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2013-06-05 13:47:36
              UPDATE