Eprint

Results: 2085



#Item
321

A Formal Security Analysis of the Signal Messaging Protocol Version 1.1, October 2016† Katriel Cohn-Gordon1 , Cas Cremers1 , Benjamin Dowling2 , Luke Garratt1 , and Douglas Stebila3 1

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-11-01 11:47:38
    322

    New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs Saikrishna Badrinarayanan∗ Dakshita Khurana†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-06-19 19:48:47
      323

      Dynamic Network Analysis in Julia Weijian Zhang September 2015 MIMS EPrint:

      Add to Reading List

      Source URL: eprints.ma.man.ac.uk

      - Date: 2015-09-03 10:14:26
        324

        On Constructing One-Way Permutations from Indistinguishability Obfuscation Gilad Asharov∗ Gil Segev∗

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-10-11 04:16:04
          325

          History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2008-08-18 02:50:19
            326

            Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman August 26, 2009 Abstract This paper presents an attack on the strong collision resistance of the Spectral Hash SHA-3 candidate.

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2009-08-26 12:02:39
              327

              NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-03-14 12:16:03
                328

                Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA Jean-Luc Beuchat, Eiji Okamoto, and Teppei Yamazaki Graduate School of Systems and Information Engineering University of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki,

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2010-09-16 01:29:35
                  329

                  Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-05-23 08:52:57
                    330

                    T S  S F  L B C Ray Beaulieu Douglas Shors Jason Smith Stefan Treatman-Clark

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2013-06-19 16:15:42
                      UPDATE