IACR

Results: 2241



#Item
901Binary operations / Finite fields / Computational hardness assumptions / Group theory / Trapdoor function / Public-key cryptography / One-way function / Exponentiation / Discrete logarithm / Cryptography / Abstract algebra / Mathematics

An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alp´ ar1,2⋆ , Jaap-Henk Hoepman1,2 , and Wouter Lueks1,2⋆⋆ 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-02-28 05:16:42
902Proof of knowledge / IP / Zero-knowledge proof / NP / Commitment scheme / Quadratic residue / Cryptography / Cryptographic protocols / Applied mathematics

On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University Classic Zero-Knowledge Protocols

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-09-22 17:56:28
903Integer sequences / Ring theory / Public-key cryptography / Field theory / Finite field / Prime number / Factorial / Ring / Modular arithmetic / Mathematics / Abstract algebra / Mathematical analysis

Batch binary Edwards D. J. Bernstein University of Illinois at Chicago NSF ITR– Nonnegative elements of Z:

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-09-22 18:54:06
904Cryptography / Computing / Bitcoin / Peer-to-peer computing / Business / Electronic commerce / Cryptographic nonce / Electronic money / Peer-to-peer / Payment systems / Software / Financial cryptography

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O. Karame NEC Laboratories EuropeHeidelberg, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-03 04:11:29
905Symbol / RSA / Structure / Cryptography / Model theory / Advantage

Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh ∗ Brent Waters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-03-21 13:19:19
906TWINKLE / Measure theory

Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit Willi Geiselmann Rainer Steinwandt

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-06-12 08:53:34
907Public-key cryptography / Ron Rivest / RSA / Massachusetts Institute of Technology / Cryptography / Academia / Illegitimi non carborundum

Illegitimi non carborundum Ronald L. Rivest Viterbi Professor of EECS MIT, Cambridge, MA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-08-29 07:15:56
908Collision attack / X.509 / Arjen Lenstra / Transport Layer Security / Alexander Sotirov / Crypt / Cryptography / Cryptographic protocols / MD5

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens Alexander Sotirov Jacob Appelbaum

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-09-22 18:23:04
909Mathematics / Elliptic curves / Linear algebra / Module theory / Pairing / Weil pairing / Elliptic curve / Elliptic curve cryptography / Abstract algebra / Algebra / Cryptography

Homomorphic Encryption and Signatures from Vector Decomposition

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-06-28 08:08:10
910International Cryptology Conference / Kevin McCurley / Cryptography / Year of birth missing / Reihaneh Safavi-Naini

MINUTES IACR MEMBERSHIP MEETING CRYPTO’12 UCSB, 22 AUGUST 2012 Opening. AtPreneel opens the meeting. He begins by giving an overview of the IACR and its activities. Treasurer’s Report. Rose presents the curren

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-08-16 17:22:10
UPDATE