IACR

Results: 2241



#Item
871

Cryptography and Coding, Cirencester Eleventh IMA International Conference on Cryptography and Coding 18th - 20th December 2007 Royal Agricultural College, Cirencester, UK

Add to Reading List

Source URL: www.iacr.org

- Date: 2007-07-03 11:19:20
    872

    Accountable Certificate Management using Undeniable Attestations Ahto Buldas Peeter Laud

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2000-08-22 09:56:36
      873

      Asiacrypt$2012$ e:(G(×(G(⟶(G2( Pairings(and(Beyond( Dan$Boneh$

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2012-12-14 06:25:26
        874

        MINUTES IACR BOARD MEETING EUROCRYPT’14 COPENHAGEN, 11 MAYO PENING M ATTERS At 9.38 Cachin opens the meeting and he briefly goes around for an introductory round, confirming attendees and establishing who is h

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2014-09-03 05:24:48
          875

          Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer Dept. of Computer Science, Aarhus University

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2001-12-17 07:56:45
            876

            Key recovery attacks on NTRU without ciphertext validation routine Daewan Han, Jin Hong, Jae Woo Han, and Daesung Kwon National Security Research Institute, 161 Gajeong-dong, Yuseong-gu, Daejeon, , KOREA dwh,jinho

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2003-04-18 23:20:42
              877

              What number r of different IVs, and what keystream sequence length l, do we need before this technique can be applied enoug...

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2001-12-10 04:48:31
                878

                Quasi-Efficient Revocation of Group Signatures Giuseppe Ateniese1 , Dawn Song2 , and Gene Tsudik3 1 Department of Computer Science The Johns Hopkins University, Baltimore, MD. USA

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2002-04-01 19:10:52
                  879

                  Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications compatible with OpenPGP 22nd of March, 2001(†) Vlastimil Klíma 1 and Tomáš Rosa 1,2 1

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2002-06-17 08:38:14
                    880

                    An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation Ivan Damg˚ ard? , Rasmus Lauritsen? , and Tomas Toft?? Department of Computer Science, Aarhus University {ivan,rwl,ttoft}@cs.au.dk

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2014-07-04 12:29:37
                      UPDATE