Eprint

Results: 2085



#Item
651

Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications Benoˆıt Libert1 , Thomas Peters2 , Marc Joye3 , and Moti Yung4 1 Ecole Normale Sup´erieure de Lyon, Laborat

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-11 07:41:43
    652

    PDF Document

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-03-19 11:06:32
      653

      PDF Document

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2004-04-16 02:44:40
        654

        PDF Document

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2011-10-04 05:27:27
          655

          PDF Document

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2014-08-25 09:28:00
            656

            Geppetto: Versatile Verifiable Computation Craig Costello Microsoft Research Markulf Kohlweiss

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2014-11-30 18:27:56
              657

              Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL Enrico Thomae, Christopher Wolf

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2012-07-18 09:00:20
                658

                Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources Michael Backes, Aniket Kate, Sebastian Meiser, and Tim Ruffing CISPA, Saarland University, Germany {backes@cs, aniket@mmci, meiser@cs, tim.ruff

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-04-02 11:21:02
                  659

                  Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity∗ Emiliano De Cristofaro and Gene Tsudik University of California, Irvine {edecrist,gts}@ics.uci.edu Abstract

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2010-08-04 17:45:58
                    660

                    Elliptic Curve Cryptography in Practice Joppe W. Bos1 , J. Alex Halderman2 , Nadia Heninger3 , Jonathan Moore, Michael Naehrig1 , and Eric Wustrow2 1 Microsoft Research

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2013-12-02 05:21:30
                      UPDATE