Cryptology ePrint Archive

Results: 16



#Item
11Precomputation / Trade-off / Mathematics / Computing / Logic / Software optimization / Rainbow table / Algorithm

Cryptology ePrint Archive: Report[removed]This is the full version of the article presented at ACISP 2013 under the same title. LNCS 7959, pp.347–362. DOI: [removed][removed]3_24 Analysis of the Non-Perfect Tab

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 01:44:22
12Digital signature / Commitment scheme / Random oracle / XTR / Public-key cryptography / BLS / Cryptography / Blind signature / Group signature

Full version of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report[removed]Limitations on Transformations from Composite-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-09-20 15:10:08
13Applied mathematics / Learning with errors / Public-key cryptography / Cipher / Mathematics / Technology / Cryptography / Ciphertext indistinguishability / RSA

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as Report[removed]Verifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:58
14Information / Proof of knowledge / Data / Mathematical proof / Non-interactive zero-knowledge proof / Malleability / Cryptographic protocols / Zero-knowledge proof / Mathematics

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as Report[removed]Malleable Proof Systems and Applications Melis

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:41
15Digital signature / Commitment scheme / Random oracle / XTR / Public-key cryptography / BLS / Cryptography / Blind signature / Group signature

Full version of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report[removed]Limitations on Transformations from Composite-

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:28
16RC4 / Distinguishing attack / Weak key / Keystream / Cryptology ePrint Archive / Cipher / Fluhrer /  Mantin and Shamir attack / Py / Cryptography / Stream ciphers / Pseudorandom number generators

1(4) The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4 Joachim Strömbergson1, Simon Josefsson2 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-29 06:53:59
UPDATE