<--- Back to Details
First PageDocument Content
Reihaneh Safavi-Naini / Lange / Eurocrypt / International Cryptology Conference / Alptekin
Date: 2014-05-13 08:05:15
Reihaneh Safavi-Naini
Lange
Eurocrypt
International Cryptology Conference
Alptekin

EUROCRYPT 2014 Rump Session Programme[removed]IACR Award Ceremony (Christian Cachin[removed]Cryptanalysis of EUROCRYPT[removed]Phong Nguyen; Elisabeth Oswald[removed]Practical Complexity Cube Attacks on Round-Reduc

Add to Reading List

Source URL: ec14.compute.dtu.dk

Download Document from Source Website

File Size: 14,84 KB

Share Document on Facebook

Similar Documents

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

DocID: 1xVS4 - View Document

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

DocID: 1xV7Y - View Document

Full version of an extended abstract published in Proceedings of Eurocrypt 2014, Springer-Verlag, 2014. D´ej`a Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn∗ UC San Diego

Full version of an extended abstract published in Proceedings of Eurocrypt 2014, Springer-Verlag, 2014. D´ej`a Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn∗ UC San Diego

DocID: 1xUHi - View Document

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

DocID: 1xUhb - View Document

PDF Document

DocID: 1xqsq - View Document