Eprint

Results: 2085



#Item
791Indexing / Search engine indexing / Searching / Web search engine / Database / Extensible Storage Engine / XTR / Advantage / Information science / Information / Information retrieval

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud † Faculty Chang Liu† , Liehuang Zhu‡ , and Jinjun Chen† ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 04:09:39
792Advanced Encryption Standard / Central processing unit / Computer memory / Virtual machines / CPU cache / Hyper-V / Timing attack / AES instruction set / Xen / System software / Software / Computing

Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar ∗ Worcester Polytechnic Institute {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abst

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-07 18:32:56
793Complexity classes / EXPTIME / P/poly / Time complexity / PP / NL / P / NC / Theoretical computer science / Computational complexity theory / Applied mathematics

Succinct Randomized Encodings and their Applications∗ Nir Bitansky† Sanjam Garg‡ Huijia Lin§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 11:01:51
794IP / Homomorphic encryption / Zero-knowledge proof / NP / One-way function / Cryptography / Applied mathematics / Cryptographic protocols

ON NON-BLACK-BOX SIMULATION AND THE IMPOSSIBILITY OF APPROXIMATE OBFUSCATION ∗ NIR BITANSKY† AND OMER PANETH‡ Abstract. The introduction of a non-black-box simulation technique by Barak (FOCShas been a major

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 10:26:13
795Paillier cryptosystem / Homomorphic encryption / Goldwasser–Micali cryptosystem / Learning with errors / Oblivious transfer / RSA / XTR / ElGamal encryption / Random self-reducibility / Cryptography / Public-key cryptography / Electronic commerce

Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 15:33:43
796XTR / Normal distribution / Structure / Diffie–Hellman key exchange / YAK / Cryptographic protocols / Mathematics / Finite fields

1 Strongly Secure Authenticated Key Exchange from Ideal Lattices Xiaopeng Yang and Wenping Ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-12 05:00:54
797Operator theory / Field theory / Chernoff bound / Inverse function theorem / Mathematical analysis / Mathematics / Fourier analysis

Bounds on surmising remixed keys Daniel R. L. Brown∗ Rough draft May 7, 2015 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 15:21:41
798Complex analysis / Pi

Broadcast from Minicast Secure Against General Adversaries? Pavel Raykov1,2,?? 2 1 School of Electrical Engineering, Tel-Aviv University, Israel

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 07:36:27
799Marketing / Computing / Business models / Pricing strategies / Software as a service / Revenue management / Price discrimination / Data as a service / Utility computing / Business / Pricing / Cloud computing

FINANCIAL CRYPTOGRAPHY: DISCRIMINATORY PRICING MECHANISM Sumit Chakraborty Fellow, Indian Institute of Management Calcutta, BEE (Jadavpur University), India E-mail: , Ph

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 23:34:18
800ICE / Feistel cipher / Differential cryptanalysis / Key schedule / Differential of a function / Differential equation / Differential / Block cipher / Cryptography / MISTY1 / KASUMI

Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1 Department of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 07:22:52
UPDATE