Eprint

Results: 2085



#Item
771Side channel attack / Diffie–Hellman key exchange / Advantage / Public-key cryptography / Semantic security / Cryptography / Cryptographic protocols / Random oracle

Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1 Colin Boyd3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 00:49:04
772MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-29 17:14:50
773Random oracle / Pseudorandom generator / One-way function / Pseudorandom function family / Zero-knowledge proof / Oracle machine / Feistel cipher / Cryptography / Pseudorandomness / Ciphertext indistinguishability

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
774Database management systems / Database theory / SQL keywords / Relational database management systems / ODB / Relational database / Database / SQL / Column / Data management / Computing / Data

Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin K¨upc¸u¨ Crypto Group, Koc¸ University, Istanbul, Turkey {metemad, akupcu}@ku.edu.tr Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 12:13:31
775Pseudorandomness / Cryptography / Computational complexity theory / Algorithmic information theory / Pseudorandom generator / Pseudorandom function family / Obfuscated code / Advantage / Obfuscation / Mathematics / Theoretical computer science / Applied mathematics

On the Correlation Intractability of Obfuscated Pseudorandom Functions Ran Canetti∗ Yilei Chen†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 00:12:34
776Computational hardness assumptions / Finite fields / Decisional Diffie–Hellman assumption / Diffie–Hellman problem / Vector space / Matrix / Kalman filter / Principal component analysis / Algebra / Mathematics / Cryptography

Matrix Computational Assumptions in Multilinear Groups Paz Morillo1 , Carla R`afols2 , and Jorge L. Villar1? 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 07:04:42
777Cryptographic software / Tor / Internet / Onion routing / Blind signature / Group signature / Computing / Internet privacy / Cryptography / Software

Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane KSecurity, BP 47136, Dakar, Senegal.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 17:40:02
778Cube attack / Tiny Encryption Algorithm / Correlation attack / Linear feedback shift register / Trivium / Key schedule / ICE / Differential cryptanalysis / NLFSR / Cryptography / Stream ciphers / Grain

A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-15 10:23:44
779Rectangular function

Benes and Butterfly schemes revisited Jacques Patarin, Audrey Montreuil Universit´e de Versailles 45 avenue des Etats-UnisVersailles Cedex - France Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-07 07:53:45
    780Secure multi-party computation / Standard model / Homomorphic encryption / Pseudorandom generator / Cryptographic primitive / Commitment scheme / Information-theoretic security / Goldwasser–Micali cryptosystem / Secret sharing / Cryptography / Cryptographic protocols / Electronic commerce

    Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-14 07:10:50
    UPDATE