Eprint

Results: 2085



#Item
271

SpaceMint: A Cryptocurrency Based on Proofs of Space∗ Sunoo Park: Albert Kwon: Georg Fuchsbauer;

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-05-12 00:44:04
    272

    Black-Box Separations for Differentially Private Protocols∗ Dakshita Khurana† Hemanta K. Maji† Amit Sahai†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-11-23 05:56:27
      273

      Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis∗ Kristiyan Haralambiev † Adriana L´opez-Alt ‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2010-09-15 14:13:14
        274

        Secure Arithmetic Computation with No Honest Majority Yuval Ishai ∗ Manoj Prabhakaran † Amit Sahai ‡

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2008-11-08 12:56:54
          275

          Lower Bounds in the Hardware Token Model Shashank Agrawal∗ Prabhanjan Ananth† Manoj Prabhakaran§

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-01-12 02:49:37
            276

            Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette1 , Kevin Lewi2 , Stephen A. Weis3 , and David J. Wu2 1 Rose-Hulman Institute of Technology 2

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-02-05 16:46:30
              277

              Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information Milivoj Simeonovski1 , Fabian Bendun1 , Muhammad Rizwan Asghar2⋆ , Michael Backes1,3, Ninja Marnau1 , and Peter Druschel3 1

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-06-15 08:28:47
                278

                The Power of Negations in Cryptography Siyao Guo∗ Tal Malkin† Igor C. Oliveira‡

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2015-04-07 06:33:25
                  279

                  Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko† Gil Segev‡

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2013-10-21 19:18:05
                    280

                    Non-Interactive RAM and Batch NP Delegation from any PIR Zvika Brakerski∗ Justin Holmgren† Yael Kalai‡

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-08-08 17:18:52
                      UPDATE