Eprint

Results: 2085



#Item
781Homomorphic encryption / Post-quantum cryptography / Learning with errors / Quantum computer / Zero-knowledge proof / Public-key cryptography / RSA / Random self-reducibility / Oblivious transfer / Cryptography / Lattice-based cryptography / Lattice problem

Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 18:23:29
782One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
783Abstract algebra / Combinatorics / Permutation

A Group-theory Method to The Cycle Structures of Feedback Shift Registers Ming Li Yupeng Jiang and Dongdai Lin State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Scienc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 03:59:26
784Modular arithmetic / Public-key cryptography / Quadratic residue / Commutative algebra / Rabin cryptosystem / RSA / Blum integer / Modulo operation / Legendre symbol / Abstract algebra / Mathematics / Cryptography

Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov, Yandex LLC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 08:08:37
785Library science / Academic publishing / Open access / Database theory / Knowledge representation / Metadata / EPrints / Spreadsheet / Database / Communication / Information / Data

EPrints  3.3  for   Research  Data   Data-­‐Oriented  EPrint  Records   •  Dataset  

Add to Reading List

Source URL: datapool.soton.ac.uk

Language: English - Date: 2012-08-31 09:11:28
786Bayesian network / Networks / Statistical theory / Bayesian inference / Graphical model / Bayesian probability / Spatial analysis / Statistical classification / Machine learning / Statistics / Bayesian statistics / Statistical models

Microsoft Word - Walker_ACMGIS_paper_QUT_eprint_version.doc

Add to Reading List

Source URL: www.norsys.com

Language: English - Date: 2014-04-29 22:36:32
787Hash function / Cyberwarfare / Quantum superposition / Security / Applied mathematics / Cryptography / Commitment scheme / Cryptographic hash function

Computationally binding quantum commitments Dominique Unruh University of Tartu April 21, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 10:58:50
788General number field sieve / Special number field sieve / Integer factorization / Arjen Lenstra / Herman te Riele / Factor base / RSA / Factorization / Jens Franke / Integer factorization algorithms / Cryptography / Mathematics

Factorization of a 1061-bit number by the Special Number Field Sieve Greg Childers California State University Fullerton Fullerton, CAAugust 4, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-06 19:06:43
789Electronic commerce / Internet privacy / Signcryption / Encryption / Cipher / Secure communication / National Security Agency / Key generation / Secure multi-party computation / Cryptography / Public-key cryptography / Cryptographic protocols

SECURITY INTELLIGENCE for BROADCAST: THREAT ANALYTICS Sumit Chakraborty Fellow, Indian Institute of Management Calcutta, BEE (Jadavpur University), India E-mail: , ; Phon

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 09:37:56
790SHA-2 / Collision attack / MD5 / Preimage attack / MD4 / Cryptanalysis / Collision / Hash function / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / SHA-1

Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 04:23:58
UPDATE