Eprint

Results: 2085



#Item
721

Synchronized Aggregate Signatures: New Definitions, Constructions and Applications Jae Hyun Ahn Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-07-29 13:56:06
    722

    Efficient Group Signatures without Trapdoors ∗ Giuseppe Ateniese Breno de Medeiros

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-04-20 22:07:05
      723

      Microsoft Word - eprint_CZ.doc

      Add to Reading List

      Source URL: crypto-world.info

      Language: Czech - Date: 2006-12-24 14:10:15
        724

        An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates ∗ Ivan Bjerre Damg˚ ard Gudmund Skovbjerg Frandsen

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2001-11-22 07:35:13
          725Binary operations / Finite fields / Computational hardness assumptions / Group theory / Trapdoor function / Public-key cryptography / One-way function / Exponentiation / Discrete logarithm / Cryptography / Abstract algebra / Mathematics

          An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alp´ ar1,2⋆ , Jaap-Henk Hoepman1,2 , and Wouter Lueks1,2⋆⋆ 1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2013-02-28 05:16:42
          726Cryptography / Computing / Bitcoin / Peer-to-peer computing / Business / Electronic commerce / Cryptographic nonce / Electronic money / Peer-to-peer / Payment systems / Software / Financial cryptography

          Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O. Karame NEC Laboratories EuropeHeidelberg, Germany

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2012-05-03 04:11:29
          727Symbol / RSA / Structure / Cryptography / Model theory / Advantage

          Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh ∗ Brent Waters

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2007-03-21 13:19:19
          728Reconfigurable computing / Field-programmable gate array / Digital electronics / Altera / Xilinx / Application-specific integrated circuit / Electronic engineering / Fabless semiconductor companies / Electronics

          On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings Version 2.0, November 18, 2010 Xu Guo, Sinan Huang, Leyla Nazhandali and Patrick Schaumont Bradley Department of Electrical and Computer Engineering

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2010-11-19 04:19:44
          729Algebra / Mathematics / Elliptic curve / Affine space / Exponentiation / Hessian form of an elliptic curve / Table of costs of operations in elliptic curves / Abstract algebra / Elliptic curves / Elliptic curve cryptography

          Countermeasures against side-channel attacks for EC cryptosystems 1 Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems*

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2001-11-23 07:00:41
          730Finite fields / Key management / Public-key cryptography / Advantage / CBC-MAC / CMAC / Block cipher / Cipher / Key size / Cryptography / Message authentication codes / Block cipher modes of operation

          Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2002-12-02 19:59:21
          UPDATE