Eurocrypt

Results: 87



#Item
21Eurocrypt / Password-authenticated key agreement / cole Normale Suprieure

Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2016-06-01 09:22:58
22Cryptography / Public-key cryptography / Password-authenticated key agreement / Eurocrypt / International Cryptology Conference / Asiacrypt / Digital signature / RSA

Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2016-06-01 09:22:58
23

A generic view on trace-and-revoke broadcast encryption schemes Dennis Hofheinz? and Christoph Striecks?? Karlsruhe Institute of Technology, Karlsruhe, Germany Abstract. At Eurocrypt 2011, Wee presented a generalization

Add to Reading List

Source URL: www.kjdf.de

Language: English - Date: 2014-06-10 05:37:37
    24

    A preliminary version of this paper appeared in: T. Ristenpart, H. Shacham, and T. Shrimpton. Careful with Composition: Limitations of the Indifferentiability Framework. Advances in Cryptology – EUROCRYPT ’11, LNCS v

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2012-09-28 13:55:56
      25

      How to Certify the Leakage of a Chip? F. Durvaux, F.-X. Standaert, N. Veyrat-Charvillon UCL Crypto Group, Belgium EUROCRYPT 2014, Copenhagen, Denmark

      Add to Reading List

      Source URL: ec14.compute.dtu.dk

      Language: English - Date: 2014-05-16 06:54:28
        26

        Commuting signatures and veriable encryption Georg Fuchsbauer University of Bristol EUROCRYPT

        Add to Reading List

        Source URL: www.di.ens.fr

        Language: English - Date: 2011-06-06 13:44:20
          27

          Brokered ID – a killer app for S2PC? Presented at Eurocrypt 2015 rump session Luís Brandão, April 28*, 2015, Sofia, Bulgaria (Slides updated on May 28, 2015, with solution to the TLA challenge) An idea from:

          Add to Reading List

          Source URL: webpages.alunos.fc.ul.pt

          Language: English - Date: 2015-05-28 18:32:49
            28

            Generic Universal Forgery Attack on Iterative Hash-based MACs Thomas Peyrin and Lei Wang EUROCRYPT 2014

            Add to Reading List

            Source URL: ec14.compute.dtu.dk

            Language: English - Date: 2014-05-16 06:27:32
              29Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

              A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-02-17 07:57:12
              30

              A preliminary version of this paper appeared in: T. Ristenpart, H. Shacham, and T. Shrimpton. Careful with Composition: Limitations of the Indifferentiability Framework. Advances in Cryptology – EUROCRYPT ’11, LNCS v

              Add to Reading List

              Source URL: web.cecs.pdx.edu

              Language: English - Date: 2011-06-27 19:07:47
                UPDATE