IACR

Results: 2241



#Item
921Malleability / ID-based encryption / Advantage / Chosen-plaintext attack / Cipher / Ciphertext indistinguishability / Semantic security / Cryptography / Chosen-ciphertext attack / RSA

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts∗ Duong-Hieu Phan 1,2,3 Siamak F. Shahandashti 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-23 20:29:45
922Radio electronics / Wireless / Radio-frequency identification / Keyless Go / Automatic identification and data capture / Smart key / Remote keyless system / Antenna / Relay attack / Technology / Electronic engineering / Telecommunications engineering

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris Danev, Srdjan Capkun Department of Computer Science ETH Zurich 8092 Zurich, Switzerland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-10-21 16:52:49
923Onion routing / Tor / Universal composability / Routing / Traffic analysis / Public-key cryptography / Communications protocol / Cryptography / Internet privacy / Computing

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-03-20 11:08:29
924Institute of Mathematics and its Applications / Southend-on-Sea / Academic publishing

In Cooperation with IACR 15TH IMA INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY AND CODINGDecember 2015, St. Catherine’s College, University of Oxford

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2015-04-15 04:32:22
925

PDF Document

Add to Reading List

Source URL: www.iacr.org

Language: Russian - Date: 2006-05-22 09:35:55
    926Serge Vaudenay / Correlation attack / Technology / Correlation and dependence / Linear feedback shift register / Bluetooth / Computing / Cryptography / Pseudorandom number generators / Covariance and correlation

    The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption CRYPTO’05, Santa Barbara

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2005-09-01 16:50:50
    927Alice and Bob / Applied mathematics / Mathematics / Quantum key distribution / Quantum information science / Cryptography / Quantum cryptography

    Quantum Key Recycling Joint work with Ivan Damg˚ ard and Louis Salvail Thomas B. Pedersen

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2005-08-31 11:29:17
    928Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing

    i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-22 06:51:37
    929Mathematical notation / Multiplication / XTR / Hamming weight / Mathematics / Finite fields / Elementary arithmetic

    Higher-Order Side Channel Security and Mask Refreshing Jean-S´ebastien Coron1 , Emmanuel Prouff2 , Matthieu Rivain3 , and Thomas Roche2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-21 05:34:50
    930Optimal asymmetric encryption padding / Chosen-ciphertext attack / Chosen-plaintext attack / Signcryption / Cipher / Symmetric-key algorithm / RSA / Probabilistic encryption / Semantic security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

    Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2003-12-17 04:10:40
    UPDATE