Eprint

Results: 2085



#Item
671

Technical Report CS97-529, Department of Computer Science and Engineering, University of California at San Diego, MarchRevised MarchA Note on Negligible Functions Mihir Bellare∗ Dept. of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2002-03-01 13:12:41
    672

    This is the full version of the extended abstract which appears in Proceedings of the 10th ACM Conference on Computer and Communications Security, pages ???–??? (October 27 – 30, 2003, Washington, DC, USA.) Security

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2003-10-23 15:28:54
      673

      An Information-Theoretic Model for Steganography∗ Christian Cachin† March 3, 2004 Abstract An information-theoretic model for steganography with a passive adversary is proposed.

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2004-03-04 03:32:53
        674

        Providing Root of Trust for ARM TrustZone using On-Chip SRAM Shijun Zhao Qianying Zhang

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-11-04 00:11:44
          675

          Authentication and Key Agreement via Memorable Password Taekyoung Kwon University of California, Berkeley or Updated on August 20, 2000

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2000-08-23 06:08:21
            676

            A Designer’s Guide to KEMs Alexander W. Dent Information Security Group, Royal Holloway, University of London, Egham Hill, Egham, Surrey, U.K.

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2005-10-31 11:18:21
              677

              ePrint iPhone/Android比較表 iPhone 全般

              Add to Reading List

              Source URL: www.e-workshop-dev.com

              Language: Japanese - Date: 2013-11-07 02:11:13
                678

                Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization Brent Waters ∗ University of Texas at Austin

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2010-12-20 15:30:13
                  679

                  Forward Security in Threshold Signature Schemes M ICHEL A BDALLA S ARA M INER 

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2000-06-16 16:45:47
                    680

                    Implementing Gentry’s Fully-Homomorphic Encryption Scheme Craig Gentry Shai Halevi IBM Research

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2011-02-04 14:26:37
                      UPDATE