Eprint

Results: 2085



#Item
251

Public-Key Cryptographic Primitives Provably as Secure as Subset Sum Vadim Lyubashevsky1? , Adriana Palacio2 , and Gil Segev3?? 1 2

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2009-11-27 11:54:59
    252

    Block-wise Non-malleable Codes∗ Nishanth Chandran†1 , Vipul Goyal‡1 , Pratyay Mukherjee§2 , Omkant Pandey¶3 , and Jalaj Upadhyayk4 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-10-16 23:27:03
      253

      Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev† Abstract

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2012-05-30 13:55:48
        254

        The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA December 2015

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-03-14 22:54:08
          255

          Fully Leakage-Resilient Signatures Elette Boyle∗ Gil Segev† Daniel Wichs‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2012-10-07 22:37:50
            256

            After-the-Fact Leakage in Public-Key Encryption Huijia Lin∗ Cornell University Shai Halevi IBM Research

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2011-01-06 01:53:57
              257

              Non-committing encryption from Φ-hiding Brett Hemenway Rafail Ostrovsky∗ Alon Rosen†

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-01-22 15:41:21
                258

                Functional Encryption: Decentralized and Delegatable Nishanth Chandran∗ Vipul Goyal†

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2015-11-03 09:54:12
                  259

                  Targeted Homomorphic Attribute Based Encryption Zvika Brakerski∗ David Cash† Rotem Tsabary∗

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-07-11 11:15:24
                    260

                    Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows† Christof Beierle1 , Philipp Jovanovic2 , Martin M. Lauridsen3 , Gregor Leander1? , and Christian Rechberger3 1

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-01-05 09:31:19
                      UPDATE