Eprint

Results: 2085



#Item
951Group signature / Accumulator / Proof of knowledge / Diffie–Hellman problem / XTR / Diffie–Hellman key exchange / Zero-knowledge proof / Direct Anonymous Attestation / Cryptography / Cryptographic protocols / Finite fields

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 05:56:52
952Matrix theory / Matrices / Determinants / Circulant matrix / Numerical linear algebra / Matrix / Eigenvalues and eigenvectors / Theorems and definitions in linear algebra / Auxiliary function / Algebra / Linear algebra / Mathematics

On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks DU Yusong1 * , WEI Baodian2 , ZHANG Fangguo2 & ZHANG Huang2 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 18:34:47
953Numbers / Prime number / 300 / 400 / 700 / 900 / 600 / 800 / Gaussian integer / Mathematics / Number theory / Integer sequences

Cubic Groups M. A. Popov Abstract Post-nonclassical intuitionistic “natural” arithmetic with its fundamental simplifications in the case of the problem of asymptotic distribution of primes is considered. It is showed

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 08:49:29
954Key schedule / ICE / Differential cryptanalysis / Linear cryptanalysis / Advantage / Block cipher / Cryptography / SAFER / Advanced Encryption Standard

New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-03 02:21:46
955Cryptography / Deterministic encryption / Search engine indexing / Extensible Storage Engine / Internet protocols / Information science / Information retrieval / Information

Practical Dynamic Searchable Encryption with Small Leakage Emil Stefanov Charalampos Papamanthou

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-08 19:43:06
956Cryptography / Mathematics / Elliptic curve cryptography / Linear algebra / Module theory / Pairing / Elliptic curve / Tate pairing / Curve / Abstract algebra / Elliptic curves / Algebra

Faster Pairing Computations on Curves with High-Degree Twists Craig Costello1 , Tanja Lange2 , and Michael Naehrig2 1 Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-14 04:16:49
957Information / Secure multi-party computation / Graph theory / Topology / Graph / Neighbourhood / Communications protocol / Vertex / Network topology / Cryptographic protocols / Data / Mathematics

Topology-Hiding Computation Tal Moran ∗ Ilan Orlov † Silas Richelson ‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-31 19:21:26
958Proof theory / Zero-knowledge proof / Interactive proof system / Commitment scheme / IP / Soundness / Probabilistically checkable proof / Random oracle / Symbol / Cryptography / Theoretical computer science / Cryptographic protocols

— A merged version of this work and the work of [BGW12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — On the (In)security of the Fiat-Shamir Paradigm, Revisited Dana Dachman-Soled M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 13:39:52
959Finite fields / Hidden Field Equations / Mathematics / Affine geometry / Affine transformation / Unbalanced Oil and Vinegar / Differential geometry / Multivariate cryptography / Frobenius group / Post-quantum cryptography / Geometry / Abstract algebra

Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf1,2 , and Bart Preneel1 1 K.U.Leuven, ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-22 06:53:55
960Mathematics / Cryptography / Group theory / Finite fields / Weil pairing / Elliptic curve / Pairing / Supersingular elliptic curve / Tate pairing / Abstract algebra / Elliptic curves / Algebra

Comparing Implementation Efficiency of Ordinary and Squared Pairings Christine Abegail Antonio1 , Satoru 2 and Ken Nakamula3 Department of Mathematics, Tokyo Metropolitan University Minami-Osawa, Hachioji-shi Tokyo, Japa

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-07 19:51:10
UPDATE