Provable security

Results: 54



#Item
1Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign,  Carmela Troncoso, Alfredo Rial†

Scalable Anonymous Communication with Provable Security Prateek Mittal, Nikita Borisov∗ Dept. of Electrical and Computer Engineering, U. of Illinois at Urbana-Champaign, Carmela Troncoso, Alfredo Rial†

Add to Reading List

Source URL: carmelatroncoso.com

Language: English - Date: 2015-11-19 22:20:42
    2Provable post-quantum security Renato Renner	 
 Institute for Theoretical Physics

    Provable post-quantum security Renato Renner Institute for Theoretical Physics

    Add to Reading List

    Source URL: pqc2010.cased.de

    Language: English - Date: 2010-06-02 01:48:25
      3A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

      A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

      Add to Reading List

      Source URL: www.iacr.org

      - Date: 2008-06-01 02:58:21
        4How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

        How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

        Add to Reading List

        Source URL: www.sjero.net

        - Date: 2015-03-23 13:54:32
          5Practice-Oriented Provable Security and the Social Construction of Cryptography Phillip Rogaway∗ May 22, 2009†  Abstract

          Practice-Oriented Provable Security and the Social Construction of Cryptography Phillip Rogaway∗ May 22, 2009† Abstract

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          - Date: 2015-07-03 16:39:39
            62015 IEEE Symposium on Security and Privacy  How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

            2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

            Add to Reading List

            Source URL: www.ieee-security.org

            Language: English - Date: 2015-05-11 16:43:10
            7On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

            On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

            Add to Reading List

            Source URL: web.cs.ucdavis.edu

            Language: English - Date: 2005-06-19 20:47:33
            8A list of inept businesses and organisations and why. A warning for those who are not aware of their failings. This is just my provable experiences. Yahoo. This company is now so in league with the American security agen

            A list of inept businesses and organisations and why. A warning for those who are not aware of their failings. This is just my provable experiences. Yahoo. This company is now so in league with the American security agen

            Add to Reading List

            Source URL: aromamedical.org

            Language: English - Date: 2015-09-01 11:05:09
              9A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

              A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

              Add to Reading List

              Source URL: software.imdea.org

              Language: English - Date: 2014-07-17 09:25:52
              10Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

              Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

              Add to Reading List

              Source URL: 2010.eccworkshop.org

              Language: English - Date: 2010-10-25 19:46:00