1![Published in P. Y. A. Ryan, D. Naccache, and J.-J. Quisquater, Eds., The New Codebreakers (Kahn Festschrift), volof Lecture Notes in Computer Science, pp, Springer, 2016. Secure ElGamal-type Cryptosystems Published in P. Y. A. Ryan, D. Naccache, and J.-J. Quisquater, Eds., The New Codebreakers (Kahn Festschrift), volof Lecture Notes in Computer Science, pp, Springer, 2016. Secure ElGamal-type Cryptosystems](https://www.pdfsearch.io/img/b211e77ba28991cfcb77138992e8501a.jpg) | Add to Reading ListSource URL: joye.site88.netLanguage: English - Date: 2016-03-24 12:20:23
|
---|
2![ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti](https://www.pdfsearch.io/img/79c8e97eec4ad7df28bd1c93cb17c822.jpg) | Add to Reading ListSource URL: www.crypto.ethz.chLanguage: English - Date: 2015-05-05 08:36:37
|
---|
3![A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. We introduce a pre-computation technique that drastically A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. We introduce a pre-computation technique that drastically](https://www.pdfsearch.io/img/68b246148af2ccf0fa86f7d3bd5e0dcd.jpg) | Add to Reading ListSource URL: www.nada.kth.seLanguage: English - Date: 2012-05-30 08:52:53
|
---|
4![Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA](https://www.pdfsearch.io/img/d1916c840b9d33067b254f50a5f70911.jpg) | Add to Reading ListSource URL: www.cyber-ta.orgLanguage: English - Date: 2007-02-22 22:55:51
|
---|
5![Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov](https://www.pdfsearch.io/img/5ea1906dae054c11be8495e1fb482a21.jpg) | Add to Reading ListSource URL: www.cs.tau.ac.ilLanguage: English - Date: 2015-03-03 02:38:59
|
---|
6![Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a](https://www.pdfsearch.io/img/f5a24b82f2be0228fe898a28ffcd6652.jpg) | Add to Reading ListSource URL: www.nada.kth.seLanguage: English - Date: 2012-05-30 08:51:39
|
---|
7![LNCSOffline/Online Mixing LNCSOffline/Online Mixing](https://www.pdfsearch.io/img/d66531e0370c3803c6fe1814fc99ae84.jpg) | Add to Reading ListSource URL: www.nada.kth.seLanguage: English - Date: 2012-05-30 08:51:04
|
---|
8![Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet](https://www.pdfsearch.io/img/1a8e6b7f71850924347d2ab5954796b0.jpg) | Add to Reading ListSource URL: www.math.ru.nlLanguage: English - Date: 2016-04-18 16:34:53
|
---|
9![Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay, Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,](https://www.pdfsearch.io/img/420646748fc72dd647a10101f2648005.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2016-05-02 04:08:26
|
---|
10![This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn](https://www.pdfsearch.io/img/76afff3c0127a6c1d6e470fe7527107b.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2015-02-21 09:51:42
|
---|