IACR

Results: 2241



#Item
861

Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates Ali Do˘ ganaksoy, Barı¸s Ege, Onur Ko¸cak, Fatih Sulak Institute of Applied Mathematics, Middle East Technical University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-29 12:30:28
    862

    Microsoft PowerPoint - IACR_Membership_Meeting_CR2012_public.ppt

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2012-09-16 15:08:06
      863

      Pairings Elliptic curves Tate pairing Ate pairing Ate Pairing on Hyperelliptic Curves

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2007-06-12 08:49:39
        864

        Obfuscation ⇒ (IND-CPA Security 6⇒ Circular Security) Antonio Marcedone1,? and Claudio Orlandi2 1 Scuola Superiore di Catania, University of Catania, Italy,

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2014-05-02 08:12:55
          865

          Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities

          Add to Reading List

          Source URL: www.iacr.org

          Language: English - Date: 2007-06-12 08:54:07
            866

            A Note on the Soundness in Bare Public-Key Model

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2001-12-17 22:10:32
              867

              Public-Key Cryptosystems Resilient to Key Leakage Moni Naor Gil Segev

              Add to Reading List

              Source URL: www.iacr.org

              Language: English - Date: 2009-09-22 18:25:06
                868

                Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar ∗ Worcester Polytechnic Institute {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abst

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2014-04-07 18:32:56
                  869

                  Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-03-03 03:54:29
                    870

                    MINUTES IACR BOARD MEETING CRYPTO’13 UCSB, 18 AUGUSTO PENING M ATTERS AtPreneel opens the meeting and he briefly goes around to confirm attendees and establish who is holding proxies. The agenda is appr

                    Add to Reading List

                    Source URL: www.iacr.org

                    Language: English - Date: 2014-07-21 09:31:19
                      UPDATE