Eprint

Results: 2085



#Item
631

Quantum Attacks on Classical Proof Systems The Hardness of Quantum Rewinding Andris Ambainis Ansis Rosmanis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-19 09:47:39
    632

    Robust Pseudorandom Generators∗ Yuval Ishai† Eyal Kushilevitz‡ Manoj Prabhakarank

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-10-18 23:23:53
      633

      Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-24 15:27:13
        634

        Lattice Based Cryptography for Beginners – A supplementary note to the following 1. Peikert’s Bonn Lecture Slides 2. Lyubashevsky, Peikert and Regev: A toolkit for Ring-LWE 3. Steinfeld’s Lecture Slides on multilin

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-12-20 21:43:09
          635

          Eclipse Attacks on Bitcoin’s Peer-to-Peer Network ∗ Ethan Heilman∗ Alison Kendler∗ Aviv Zohar† Sharon Goldberg∗ † Hebrew University/MSR Israel

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-07-02 13:54:40
            636

            Localised Multisecret Sharing Thalia M. Laing Keith M. Martin, Information Security Group,

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-09-22 07:03:25
              637

              Asymmetric proof-of-work based on the Generalized Birthday problem Alex Biryukov Dmitry Khovratovich

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-10-01 06:33:22
                638

                Oblivious RAM Revisited Benny Pinkas∗ Dept. of Computer Science University of Haifa Mount Carmel, Haifa 31905, Israel

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2010-06-22 17:30:57
                  639

                  A Provable-Security Analysis of Intel’s Secure Key RNG Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu Abstract. We provide the first provable-secu

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2015-02-17 19:30:26
                    640

                    The leaking battery A privacy analysis of the HTML5 Battery Status API Lukasz Olejnik1 , Gunes Acar2 , Claude Castelluccia1 , and Claudia Diaz2 2

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2015-09-04 13:26:13
                      UPDATE