Eprint

Results: 2085



#Item
21Cryptography / Block ciphers / Data Encryption Standard / Finite fields / Feistel cipher / ARIA / Advanced Encryption Standard / Differential cryptanalysis / ICE / Interpolation attack / Stream cipher / XTR

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity Martin Albrecht1 , Lorenzo Grassi3 , Christian Rechberger2,3 , Arnab Roy2 , and Tyge Tiessen2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-01-05 05:07:13
22Algebra / Geometry / Abstract algebra / Algebraic geometry / Algebraic varieties / Convex geometry / Divisor / Nef line bundle / Projective variety / Abelian variety / Convex cone / Ample line bundle

CONES OF HIGHER-CODIMENSIONAL CYCLES OLIVIER DEBARRE July 14, 2010 This is joint work with L. Ein, R. Lazarsfeld, and C. Voisin (eprint arXiv:, to appear in Compos. Math.).

Add to Reading List

Source URL: www.math.ens.fr

Language: English - Date: 2010-07-14 05:23:13
23Cryptocurrencies / Cryptography / Computing / Blockchains / Information / Alternative currencies / Decentralization / Transaction processing / Bitcoin / Ethereum / Secure multi-party computation / Smart contract

Zexe: Enabling Decentralized Private Computation Sean Bowe Alessandro Chiesa Matthew Green

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-10-08 23:34:55
24Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Lie groups / Ring learning with errors / Learning with errors / Lattice / Homomorphic encryption / Order / Entropy / Ring learning with errors key exchange

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Zvika Brakerski Renen Perlman Weizmann Institute of Science∗ Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-21 15:18:19
25Complexity classes / Cryptography / Control flow / Eval / Computing / Verifiable secret sharing / Verifiable random function / Digital signature / NP / NC

Verifiable Delay Functions Dan Boneh1 , Joseph Bonneau2 , Benedikt B¨ unz1 , and Ben Fisch1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-08-21 23:38:12
26Cryptography / Secure multi-party computation / Authenticated encryption / Ciphertext indistinguishability / Public-key cryptography / Cryptographic protocol / Encryption / Digital signature / Standard model / Key / Advantage

Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards Arka Rai Choudhuri Johns Hopkins University Matthew Green

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-11-10 07:57:54
27Cryptography / Computational complexity theory / Complexity classes / Randomized algorithms / Zero-knowledge proof / Analysis of algorithms / NP / Commitment scheme / Probabilistically checkable proof / IP / Logarithm / XTR

Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting†∗ Jonathan Bootle1 , Andrea Cerulli1 , Pyrros Chaidos1∗∗ , Jens Groth1 , and Christophe Petit2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-03-08 12:29:47
28Cryptography / E-commerce / RSA / Public-key cryptography / Cryptosystem

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
29Algebra / Mathematics / Cryptography / Linear algebra / Lattice-based cryptography / Post-quantum cryptography / Lattice points / Computational hardness assumptions / Lattice / Euclidean vector / Basis / Crystal structure

Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices Shi Bai1 , Damien Stehl´e1 and Weiqiang Wen1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-08-31 11:57:10
30Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Malleability / Message authentication code / Paillier cryptosystem / RSA / Digital signature

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-02-03 04:27:06
UPDATE