IACR

Results: 2241



#Item
821

Authentication and Key Agreement via Memorable Password Taekyoung Kwon University of California, Berkeley or Updated on August 20, 2000

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2000-08-23 06:08:21
    822

    A Designer’s Guide to KEMs Alexander W. Dent Information Security Group, Royal Holloway, University of London, Egham Hill, Egham, Surrey, U.K.

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-10-31 11:18:21
      823

      Constructing MACs using blockciphers that are only secure as MACs

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2009-10-23 17:18:08
        824

        FIRST TALK A Stochastic Approach in Side-Channel Analysis in the Presence of Masking W. Schindler

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-07-03 11:19:42
          825

          MINUTES IACR BOARD MEETING CRYPTO’O PENING AtPreneel opens the meeting. People briefly introduce themselves. The agenda is approved, with the understanding that the meeting will be held in an order slight

          Add to Reading List

          Source URL: www.iacr.org

          Language: English - Date: 2012-04-16 10:11:47
            826

            Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization Brent Waters ∗ University of Texas at Austin

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2010-12-20 15:30:13
              827

              Ideal Secret Sharing Schemes Ideal Multipartite Access Structures Ideal Multipartite Secret Sharing Schemes Oriol Farràs, Jaume Martí-Farré, Carles Padró Universitat Politècnica de Catalunya

              Add to Reading List

              Source URL: www.iacr.org

              Language: English - Date: 2007-06-12 08:50:36
                828

                Forward Security in Threshold Signature Schemes M ICHEL A BDALLA S ARA M INER 

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2000-06-16 16:45:47
                  829

                  On the Composition of PublicCoin Zero-Knowledge Protocols Rafael Pass (Cornell) Wei-Lung Dustin Tseng (Cornell) Douglas Wiktröm (KTH) 1

                  Add to Reading List

                  Source URL: www.iacr.org

                  Language: English - Date: 2009-09-22 18:46:42
                    830

                    Introduction Description Strategy Attack Cryptanalysis of SFLASH with Slightly Modified Parameters Vivien Dubois, Pierre-Alain Fouque and Jacques Stern Ecole normale supérieure, Paris

                    Add to Reading List

                    Source URL: www.iacr.org

                    Language: English - Date: 2007-06-12 08:53:17
                      UPDATE