Random oracle

Results: 199



#Item
1The Random Oracle Hypothesis is False Richard Chang1 2 Benny Chor3 4 Oded Goldreich3 5 Juris Hartmanis1 Johan Hastad6 Desh Ranjan1 7 Pankaj Rohatgi1 ;

The Random Oracle Hypothesis is False Richard Chang1 2 Benny Chor3 4 Oded Goldreich3 5 Juris Hartmanis1 Johan Hastad6 Desh Ranjan1 7 Pankaj Rohatgi1 ;

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:29:27
    2A Generic Hybrid Encryption Construction in the Quantum Random Oracle Model Presented by: Angela Robinson Department of Mathematical Sciences, Florida Atlantic University  April 4, 2018

    A Generic Hybrid Encryption Construction in the Quantum Random Oracle Model Presented by: Angela Robinson Department of Mathematical Sciences, Florida Atlantic University April 4, 2018

    Add to Reading List

    Source URL: www.math.fau.edu

    Language: English - Date: 2018-04-05 10:43:42
      3The Random Oracle Methodology, Revisited Ran Canetti y  z

      The Random Oracle Methodology, Revisited Ran Canetti y z

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2014-06-22 06:29:28
        4Quantum position verification in the random oracle model Dominique Unruh University of Tartu February 12, 2014 Abstract. We present a quantum position verification scheme in the random

        Quantum position verification in the random oracle model Dominique Unruh University of Tartu February 12, 2014 Abstract. We present a quantum position verification scheme in the random

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-02-14 19:55:47
          5PPAE: Practical Parazoa Authenticated Encryption Family  PPAE: Practical Parazoa Authenticated Encryption Family Donghoon Chang2 Sumesh Manjunath R1 Somitra Kumar Sanadhya2

          PPAE: Practical Parazoa Authenticated Encryption Family PPAE: Practical Parazoa Authenticated Encryption Family Donghoon Chang2 Sumesh Manjunath R1 Somitra Kumar Sanadhya2

          Add to Reading List

          Source URL: security-lab.jaist.ac.jp

          Language: English - Date: 2015-11-25 00:46:55
          6Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

          Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

          Add to Reading List

          Source URL: keccak.noekeon.org

          Language: English - Date: 2013-02-27 15:26:40
          7Theory and Application of Extractable Functions A Dissertation Presented to the Faculty of the Graduate School of Yale University

          Theory and Application of Extractable Functions A Dissertation Presented to the Faculty of the Graduate School of Yale University

          Add to Reading List

          Source URL: cs-www.cs.yale.edu

          Language: English - Date: 2009-07-02 20:00:57
          8Using	
  Non-­‐VolaCle	
  Memory	
   	
   Bill	
  Bridge	
   So+ware	
  Architect	
   Oracle	
  

          Using  Non-­‐VolaCle  Memory     Bill  Bridge   So+ware  Architect   Oracle  

          Add to Reading List

          Source URL: hpts.ws

          Language: English - Date: 2015-10-02 08:09:35
          9ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

          ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

          Add to Reading List

          Source URL: www.crypto.ethz.ch

          Language: English - Date: 2015-02-25 05:09:48
          10Our Works The Technique and Concrete Protocol of Kunda and Paterson Our Contribution Our Future Research and Conclusion  A Security Proof for Key Exchange Protocol

          Our Works The Technique and Concrete Protocol of Kunda and Paterson Our Contribution Our Future Research and Conclusion A Security Proof for Key Exchange Protocol

          Add to Reading List

          Source URL: ctcrypt.ru

          Language: English - Date: 2016-06-10 06:35:55