1![Full version of an extended abstract published in Proceedings of PKC 2015, Springer-Verlag, 2015. Available from the IACR Cryptology ePrint Archive as ReportA Profitable Sub-Prime Loan: Obtaining the Advantage Full version of an extended abstract published in Proceedings of PKC 2015, Springer-Verlag, 2015. Available from the IACR Cryptology ePrint Archive as ReportA Profitable Sub-Prime Loan: Obtaining the Advantage](https://www.pdfsearch.io/img/21c90945d8d9ff0cab5e3b7779933465.jpg) | Add to Reading ListSource URL: smeiklej.comLanguage: English - Date: 2018-10-23 14:58:02
|
---|
2![Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha](https://www.pdfsearch.io/img/995bbd7f9c8ccc20b8c0091abb368132.jpg) | Add to Reading ListSource URL: smeiklej.comLanguage: English - Date: 2018-10-23 14:58:02
|
---|
3![Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis](https://www.pdfsearch.io/img/f597de140b1ea6be09c0e79a065cd339.jpg) | Add to Reading ListSource URL: smeiklej.comLanguage: English - Date: 2018-10-23 14:58:02
|
---|
4![Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha](https://www.pdfsearch.io/img/5d9bf0139d0a5b3b2278291d0cd406d6.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 2012-12-14 15:13:49
|
---|
5![Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp](https://www.pdfsearch.io/img/1afdb65c161ee8fd3c93f52d7c0fb982.jpg) | Add to Reading ListSource URL: www.bmoeller.deLanguage: English - Date: 2008-05-19 15:51:37
|
---|
6![Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity [Cryptology ePrint Archive, ReportBenoˆıt Chevallier-Mames1 , Mathieu Ciet2 , and Marc Joye1 1 Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity [Cryptology ePrint Archive, ReportBenoˆıt Chevallier-Mames1 , Mathieu Ciet2 , and Marc Joye1 1](https://www.pdfsearch.io/img/1e9b1e70688650a987c2f4586634fb6c.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2003-11-12 11:22:51
|
---|
7![Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp](https://www.pdfsearch.io/img/982640fe2c21f0fd626246cf24318e63.jpg) | Add to Reading ListSource URL: www.bmoeller.deLanguage: English - Date: 2008-05-19 15:51:37
|
---|
8![Full version of an extended abstract published in Proceedings of ACM CCS 2006, ACM Press, 2006. Available from the IACR Cryptology ePrint Archive as ReportHow to Win the Clone Wars: Efficient Periodic n-Times Full version of an extended abstract published in Proceedings of ACM CCS 2006, ACM Press, 2006. Available from the IACR Cryptology ePrint Archive as ReportHow to Win the Clone Wars: Efficient Periodic n-Times](https://www.pdfsearch.io/img/da0a5031f966b52a3341e17f2b31228e.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2007-04-11 21:27:39
|
---|
9![Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha](https://www.pdfsearch.io/img/d1073a94b99e7cf216a725df9c1a401f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-12-14 15:12:37
|
---|
10![IACR Guidelines for Authors Sept 2014∗ Dear Author, The purpose of this document is to clarify aspects of submission to a publication of the IACR. These guidelines complement other guidelines available on the IACR webs IACR Guidelines for Authors Sept 2014∗ Dear Author, The purpose of this document is to clarify aspects of submission to a publication of the IACR. These guidelines complement other guidelines available on the IACR webs](https://www.pdfsearch.io/img/f9cb763173699aabd3b6ce5d35ada6b5.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2014-09-22 14:38:03
|
---|