991![Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions Gilad Asharov∗ Amos Beimel† Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions Gilad Asharov∗ Amos Beimel†](https://www.pdfsearch.io/img/bac80ca5a742a2b09a5ba96f999e5092.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-12-16 05:22:34
|
---|
992![On Continuous After-the-Fact Leakage-Resilient Key Exchange ∗ Mohsen Toorani Department of Informatics On Continuous After-the-Fact Leakage-Resilient Key Exchange ∗ Mohsen Toorani Department of Informatics](https://www.pdfsearch.io/img/fa664ece03818f5f29aabe1401a125ac.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-12-20 20:07:33
|
---|
993![Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack∗ Abstract Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack∗ Abstract](https://www.pdfsearch.io/img/2865833054909cb4abb6cc45eebf6ee0.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-12-25 12:34:29
|
---|
994![Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang1,∗ Dingyi Pei1,2 Zhuojun Liu3 Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang1,∗ Dingyi Pei1,2 Zhuojun Liu3](https://www.pdfsearch.io/img/3295bf3b2557d372d54d16fdea0f7253.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-12-29 06:02:29
|
---|
995![Cryptanalysis of the Co-ACD Assumption Pierre-Alain Fouque1 , Moon Sung Lee2 , Tancr`ede Lepoint3 , and Mehdi Tibouchi4 1 Universit´e de Rennes 1 and Institut Universitaire de France, 2 Cryptanalysis of the Co-ACD Assumption Pierre-Alain Fouque1 , Moon Sung Lee2 , Tancr`ede Lepoint3 , and Mehdi Tibouchi4 1 Universit´e de Rennes 1 and Institut Universitaire de France, 2](https://www.pdfsearch.io/img/f997b00da7cc87f2a2d4574c24e49db2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-02-12 19:26:06
|
---|
996![SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1 SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1](https://www.pdfsearch.io/img/a78d90369cb63e4899d2ec5b72ae9cfe.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-12-21 12:38:00
|
---|
997![On the Impossibility of Batch Update for Cryptographic Accumulators Philippe Camacho Dept. of Computer Science, University of Chile, Blanco Encalada 2120, 3er piso, Santiago, Chile. On the Impossibility of Batch Update for Cryptographic Accumulators Philippe Camacho Dept. of Computer Science, University of Chile, Blanco Encalada 2120, 3er piso, Santiago, Chile.](https://www.pdfsearch.io/img/271ff13477a6635030926e74c3b20943.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-12-15 20:16:12
|
---|
998![SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email: SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:](https://www.pdfsearch.io/img/161f9de5338fe26db13290c906f6260a.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-12-23 06:54:05
|
---|
999![Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors? Noboru Kunihiro1 , Naoyuki Shinohara2 , and Tetsuya Izu3 1 The University of Tokyo, Japan Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors? Noboru Kunihiro1 , Naoyuki Shinohara2 , and Tetsuya Izu3 1 The University of Tokyo, Japan](https://www.pdfsearch.io/img/146851733051bb7314d4c17053deab62.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-12-13 19:33:04
|
---|
1000![Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search](https://www.pdfsearch.io/img/9e95ccf3d1319fd12e864785142d8b46.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-12-28 14:37:53
|
---|