Eprint

Results: 2085



#Item
41Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai1 , Damien Stehl´e2 , and Weiqiang Wen2 1  2

Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai1 , Damien Stehl´e2 , and Weiqiang Wen2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-09-11 03:08:31
42Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation? David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1  2

Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation? David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-08-28 04:23:05
43Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-06-25 14:23:34
44This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-12-13 06:49:27
45Implementing Pairings at the 192-bit Security Level Diego F. Aranha1 , Laura Fuentes-Casta˜ neda2 , Edward Knapp3 , Alfred 3 Menezes , and Francisco Rodr´ıguez-Henr´ıquez2

Implementing Pairings at the 192-bit Security Level Diego F. Aranha1 , Laura Fuentes-Casta˜ neda2 , Edward Knapp3 , Alfred 3 Menezes , and Francisco Rodr´ıguez-Henr´ıquez2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-25 16:25:57
46The Wonderful World of Global Random Oracles Jan Camenisch1 , Manu Drijvers1,2 , Tommaso Gagliardoni1 , Anja Lehmann1 , and Gregory Neven1 1  2

The Wonderful World of Global Random Oracles Jan Camenisch1 , Manu Drijvers1,2 , Tommaso Gagliardoni1 , Anja Lehmann1 , and Gregory Neven1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-02-08 17:16:08
47A preliminary version of this paper appears in the proceedings of EurocryptThis is the full version, which appears as IACR ePrint Archive RecordKey-Versatile Signatures and Applications: RKA, KDM and Jo

A preliminary version of this paper appears in the proceedings of EurocryptThis is the full version, which appears as IACR ePrint Archive RecordKey-Versatile Signatures and Applications: RKA, KDM and Jo

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
48The Proof is in the Pudding Proofs of Work for Solving Discrete Logarithms Marcella Hastings1 , Nadia Heninger1 , and Eric Wustrow2 1  University of Pennsylvania

The Proof is in the Pudding Proofs of Work for Solving Discrete Logarithms Marcella Hastings1 , Nadia Heninger1 , and Eric Wustrow2 1 University of Pennsylvania

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-10-05 10:39:17
49Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1  Department of Combinatorics & Optimization, University of Water

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-12-27 11:29:50
50Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-04-10 03:50:18