IACR

Results: 2241



#Item
811

Microsoft Word - ceremony-analysis.doc

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2007-10-17 07:53:09
    812

    In the blink of an eye: There goes your AES key (DRAFT of 28 MaySergei Skorobogatov Christopher Woods

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2012-05-28 11:18:48
      813

      Cryptanalysis of Grain Cˆ ome Berbain1 , Henri Gilbert1 , and Alexander Maximov2 1 France Telecom Research and Development

      Add to Reading List

      Source URL: www.iacr.org

      - Date: 2008-09-15 00:54:52
        814

        Cryptanalysis of Stream Cipher

        Add to Reading List

        Source URL: www.iacr.org

        - Date: 2007-06-12 08:55:05
          815

          International Association for Cryptologic Research Christian Cachin President, IACR May 2014

          Add to Reading List

          Source URL: www.iacr.org

          - Date: 2014-05-20 05:22:03
            816

            OAEP Reconsidered∗ Victor Shoup IBM Zurich Research Lab, S¨ aumerstr. 4, 8803 R¨ uschlikon, Switzerland

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2001-02-13 04:45:40
              817

              Technical Report CS97-529, Department of Computer Science and Engineering, University of California at San Diego, MarchRevised MarchA Note on Negligible Functions Mihir Bellare∗ Dept. of Computer Science

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2002-03-01 13:12:41
                818

                This is the full version of the extended abstract which appears in Proceedings of the 10th ACM Conference on Computer and Communications Security, pages ???–??? (October 27 – 30, 2003, Washington, DC, USA.) Security

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2003-10-23 15:28:54
                  819

                  An Information-Theoretic Model for Steganography∗ Christian Cachin† March 3, 2004 Abstract An information-theoretic model for steganography with a passive adversary is proposed.

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2004-03-04 03:32:53
                    820

                    Providing Root of Trust for ARM TrustZone using On-Chip SRAM Shijun Zhao Qianying Zhang

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2014-11-04 00:11:44
                      UPDATE