Eprint

Results: 2085



#Item
341

Measuring small subgroup attacks against Diffie-Hellman Luke Valenta∗ , David Adrian† , Antonio Sanso‡ , Shaanan Cohney∗ , Joshua Fried∗ , Marcella Hastings∗ , J. Alex Halderman† , Nadia Heninger∗ ∗ Uni

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-10-23 23:14:23
    342

    Compactness vs Collusion Resistance in Functional Encryption∗ Baiyu Li† Daniele Micciancio‡ Abstract

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-06-02 20:14:22
      343

      Polymorphic Encryption and Pseudonymisation for Personalised Healthcare A Whitepaper Version 1.1 Eric Verheul, Bart Jacobs, Carlo Meijer,

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-09-30 09:38:35
        344

        Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks? Micka¨el Cazorla, Kevin Marquet and Marine Minier Universit´e de Lyon, INRIA INSA-Lyon, CITI-INRIA, F-69621, Villeurbanne, France firstnam

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2013-05-17 03:36:53
          345

          Lattice Signatures and Bimodal Gaussians L´eo Ducas∗ and Alain Durmus∗∗ and Tancr`ede Lepoint† and Vadim Lyubashevsky‡ {Leo.Ducas, Alain.Durmus, Tancrede.Lepoint, Vadim.Lyubashevsky}@ens.fr Abstract. Our main

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2013-12-10 11:44:27
            346

            How to Backdoor Diffie-Hellman David Wong NCC Group, June

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-06-21 22:14:14
              347

              One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner. Ethan Heilman Boston University

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2014-04-04 11:11:31
                348

                Noname manuscript No. (will be inserted by the editor) Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2015-04-24 16:50:14
                  349

                  A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol (Extended version of WEWORC paper, presented in July 2007, in Bochum, Germany) Carlos Aguilar-Melchor and Philippe Gaborit XLIM - Universit

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2008-02-24 13:37:04
                    UPDATE