Eprint

Results: 2085



#Item
231

NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson1 , Philipp Jovanovic2 and Samuel Neves3 1 Kudelski Security, Switzerland

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2015-11-28 08:24:01
    232

    Is extracting data the same as possessing data? Douglas R. Stinson∗ and Jalaj Upadhyay David R. Cheriton School of Computer Science University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada September 22, 2013

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2013-09-24 19:45:27
      233

      A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2014-09-17 07:10:18
        234

        Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-01-10 04:13:59
          235

          Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-11-02 14:33:31
            236

            Robustness for Free in Unconditional Multi-Party Computation Martin Hirt and Ueli Maurer ETH Zurich, Switzerland Manuscript, February 12, 2001

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2001-03-07 10:36:36
              237

              More Constructions of Lossy and Correlation-Secure Trapdoor Functions∗ David Mandell Freeman Stanford University, USA Eike Kiltz

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2010-05-24 20:27:16
                238

                On Tight Security Proofs for Schnorr Signatures Nils Fleischhacker1 , Tibor Jager2 , and Dominique Schröder1 1 1

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-06-03 10:44:32
                  239

                  Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2014-10-22 01:56:45
                    240

                    Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds (Extended Version) Kevin Lewi Stanford University

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-08-08 15:12:50
                      UPDATE