Eprint

Results: 2085



#Item
761Public-key cryptography / Digital signature / Key management / Notary / Ciphertext indistinguishability / Computational complexity theory / Reduction / Security parameter / RSA / Cryptography / Theoretical computer science / Applied mathematics

On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 06:52:51
762Computer architecture / Cache / CPU cache / Computing / Computer data storage / CPUID / Acumem SlowSpotter / AMD 10h / Computer memory / Computer hardware / Central processing unit

F LUSH +R ELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom Katrina Falkner The University of Adelaide

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-04 21:30:09
763Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
764Quantum information science / Quantum cryptography / Models of computation / Ciphertext indistinguishability / Semantic security / Quantum circuit / Quantum key distribution / Quantum computer / Quantum channel / Cryptography / Theoretical computer science / Applied mathematics

Semantic Security and Indistinguishability in the Quantum World April 20, 2015 Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 15:29:56
765Deduction / Differential geometry / Symbol / Differential geometry of curves / Entailment / Logic / Abstract algebra / Geometry

Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext Yan Zhu, Xin Wang, RuiQi Guo Di Ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 05:08:45
766Secure multi-party computation / Homomorphic encryption / Zero-knowledge proof / IP / RSA / Cryptography / Cryptographic protocols / Public-key cryptography

Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation Berry Schoenmakers and Meilof Veeningen Eindhoven University of Technology, The Netherlands {berry@win.,m.veeningen@}tue.nl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-15 07:25:57
767Special number field sieve / Integer factorization / General number field sieve / Factorization / RSA / Lenstra elliptic curve factorization / Factor base / Quadratic sieve / Integer factorization records / Integer factorization algorithms / Cryptography / Mathematics

A kilobit special number field sieve factorization Kazumaro Aoki1 , Jens Franke2 , Thorsten Kleinjung2 , Arjen K. Lenstra3 , and Dag Arne Osvik3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-31 05:26:07
768Mixing / Mercy / Rectangular function / Cryptography / Threefish / Advantage

Optimally Secure Tweakable Blockciphers Bart Mennink Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and iMinds, Belgium Abstract. We consider the generic design of a tweakable blockci

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 16:18:36
769Ciphertext / RSA / Cipher / Semantic security / Paillier cryptosystem / ElGamal encryption / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
770Advantage / Ciphertext indistinguishability / Support / Security / Spectral theory / Cyberwarfare / Mathematics / Digital photography / Digital watermarking / Watermarking

Watermarking Cryptographic Programs Against Arbitrary Removal Strategies Ryo Nishimaki∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 16:08:47
UPDATE