Eprint

Results: 2085



#Item
961Arithmetic / Mathematical notation / Summation

Tight bound between nonlinearity and algebrai immunity Mikhail Lobanov Me h. & Math. Department Mos ow State UniversityMos ow, Russia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-07 03:23:13
962NP / Orthogonal polynomials / Polynomials / Theoretical computer science / Applied mathematics / IP

A Note on the Unsoundness of vnTinyRAM’s SNARK Bryan Parno Microsoft Research Abstract F’s inputs and outputs, if and only if there exist coefficients

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 17:25:45
963Hashing / Error detection and correction / Hash function / Preimage attack / MD5 / Advantage / Oracle machine / Random oracle / Quadratic probing / Cryptography / Cryptographic hash functions / Search algorithms

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
964Public-key cryptography / Password authentication protocol / Key-agreement protocol / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Encrypted key exchange

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords ? Junghyun Nam, Seungjoo Kim, Dongho Won, School of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-13 20:50:57
965Information theory / Mathematics / Low-density parity-check code / Reed–Solomon error correction / Niederreiter cryptosystem / McEliece cryptosystem / Parity-check matrix / Hamming / Linear code / Coding theory / Cryptography / Error detection and correction

Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 16:50:34
966Computing / Computability theory / Parallel Random Access Machine / Formal methods / Central processing unit / Distributed computing / NC / Random access machine / Actor model / Theoretical computer science / Applied mathematics / Models of computation

Computation-Trace Indistinguishability Obfuscation and its Applications Yu-Chi Chen∗ Sherman S. M. Chow† Wei-Kai Lin¶

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 11:40:02
967Cryptographic protocols / Cryptographic software / Internet protocols / Password / Security token / S/KEY / One-time password / Key-agreement protocol / Salt / Security / Computer security / Cryptography

Prompted User Retrieval of Secret Entropy: The Passmaze Protocol Daniel R. L. Brown∗ December 15, 2005 Abstract A prompting protocol permits users to securely retrieve secrets with greater entropy than

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-23 10:31:13
968Expected value / Computational complexity theory / Mathematics / Advantage / Permutation

Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Jacques Patarin1 , Val´erie Nachef2 , and Cˆome Berbain3 1 Universit´e de Versailles 45 avenue des Etats-Unis, 78035 Versailles Cedex, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-05 08:31:35
969Urn problem / Measure theory

A NON-UNIFORM BIRTHDAY PROBLEM WITH APPLICATIONS TO DISCRETE LOGARITHMS STEVEN D. GALBRAITH AND MARK HOLMES Abstract. We consider a generalisation of the birthday problem that arises in the analysis of algorithms for cer

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-14 16:15:10
970Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:28:01
UPDATE