IACR

Results: 2241



#Item
931MD5 / Search algorithms / Collision attack / MD4 / Hash function / Merkle–Damgård construction / Preimage attack / Crypt / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

An algorithm for MD5 single-block collision attack using high-performance computing cluster

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-07 01:57:01
932Cryptography / ID-based encryption / Dan Boneh

Overview of the results The Framework Work in progress Simple Functional Encryption Schemes for Inner Products

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-27 08:27:56
933Tamper resistance / Public-key cryptography / S0 / Technology / Prevention / Cryptography / Packaging / Security

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security Baodong Qin1,2, Shengli Liu1, Tsz Hon Yuen3, Robert H. Deng4, Kefei Chen5 ! 1. Shanghai Jiao Tong University, China

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-31 17:57:10
934Ciphertext indistinguishability / Cryptography

Publicly Verifiable Software Watermarking Aloni Cohen∗ Justin Holmgren† Vinod Vaikuntanathan‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-27 00:38:23
935Ciphertext / RSA / GOST / Cryptanalysis / Block cipher / Tiny Encryption Algorithm / Differential cryptanalysis / Treyfer / Cryptography / GOST standards / Advanced Encryption Standard

Fault Analysis of Kuznyechik Riham AlTawy, Onur Duman, and Amr M. Youssef Abstract Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. In thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-17 22:22:42
936RSA / Homomorphic encryption / Threshold cryptosystem / Ciphertext / Semantic security / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 14:22:01
937Polarization density / Variable / Polarization / Physics / Mathematics / Swiss people / Thomas Holenstein

Introduction Class of Random Variables Circuit Polarization

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-09-01 16:50:34
938Password / Salt / Crypt / Cryptographic software / Password strength / Password manager / Security / Cryptography / Computer security

PKC 2015 – March 31st Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:22:20
939Polynomials / Cryptography / Commutative algebra / Number theory / Polynomial / Homomorphic encryption / Irreducible polynomial / Cyclotomic polynomial / Field extension / Abstract algebra / Mathematics / Algebra

Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation Sujoy Sinha Roy1 , Kimmo J¨arvinen1 , Frederik Vercauteren1 , Vassil Dimitrov2 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 09:41:51
940Index calculus algorithm / Field / Algorithm / Group / Algebraic structures / Mathematics / Group theory

Motivation and Results Algebraic Tori Algorithm for T2 Algorithm for T6 Summary and Future Work

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-09-05 15:48:18
UPDATE