Eprint

Results: 2085



#Item
331

A preliminary version of this paper appears in the proceedings of AsiacryptThis is the full version. From Identification to Signatures, Tightly: A Framework and Generic Transforms Mihir Bellare1

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-09-04 13:48:03
    332

    Unifying Leakage Models: from Probing Attacks to Noisy Leakage Alexandre Duc1,⋆ , Stefan Dziembowski2,3,⋆⋆ , and Sebastian Faust1,⋆ ⋆ ⋆ 1 Ecole Polytechnique F´ed´erale de Lausanne, 1015 Lausanne, Switzerl

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-02-07 04:03:10
      333

      A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney** , Christina Garman† Matthew Green†, Nadia Heninger** , ††

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-04-14 04:25:54
        334

        Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Hanno Böck* Aaron Zauner†‡

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-05-17 13:33:54
          335

          Proofs of Space Stefan Dziembowski1? , Sebastian Faust2 , Vladimir Kolmogorov3?? , and Krzysztof Pietrzak3? ? ? 1 2 University of Warsaw

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2015-06-24 15:23:49
            336

            A Cryptographic Tour of the IPsec Standards Kenneth G. Paterson, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2006-04-18 09:40:43
              337

              Protecting Circuits from Computationally Bounded and Noisy Leakage ∗ Sebastian Faust† EPFL Tal Rabin

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2014-06-30 22:25:10
                338

                Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme Joppe W. Bos1 , Kristin Lauter1 , Jake Loftus2? , and Michael Naehrig1 1 Microsoft Research, {jbos,klauter,mnaehrig}@microsoft.com

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2013-09-30 18:14:41
                  339

                  Hybrid Consensus: Efficient Consensus in the Permissionless Model Rafael Pass Elaine Shi CornellTech, Cornell, Initiative for CryptoCurrency and Contracts (IC3)∗

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-09-21 16:23:12
                    340

                    Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions Ethan Heilman, Foteini Baldimtsi, and Sharon Goldberg Boston University {heilman, foteini}@bu.edu,

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-03-02 13:54:32
                      UPDATE