Eprint

Results: 2085



#Item
941State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1  Information Security Institute,

State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 00:26:26
942Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1  Department of Mathematics and System Science, Science College,

Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-17 09:45:21
943Microsoft Word - DA standarden.doc

Microsoft Word - DA standarden.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 21:30:21
944The nc-Unique Shortest Vector Problem is Hard Vadim Lyubashevsky∗ Abstract The unique Shortest Vector Problem (uSVP) gained prominence because it was the problem upon which the first provably-secure lattice-based crypt

The nc-Unique Shortest Vector Problem is Hard Vadim Lyubashevsky∗ Abstract The unique Shortest Vector Problem (uSVP) gained prominence because it was the problem upon which the first provably-secure lattice-based crypt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-01 09:32:36
945Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
946Universally Constructing 12-th Degree Extension Field for Ate Pairing Masaaki Shirase School of Systems Information, Future University Hakodate, 116-2 Kamedanakano, Hakodate, Hokkaido, Japan

Universally Constructing 12-th Degree Extension Field for Ate Pairing Masaaki Shirase School of Systems Information, Future University Hakodate, 116-2 Kamedanakano, Hakodate, Hokkaido, Japan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-18 23:01:15
947A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005  Abstract

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
948Security of ECQV-Certified ECDSA Against Passive Adversaries

Security of ECQV-Certified ECDSA Against Passive Adversaries

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-09 14:11:31
949On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
950A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-26 13:51:19