Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Crypto, Security, Privacy

Crypto, Security, Privacy

Cryptography, Security, Privacy
Crypto, Security, Privacy
How Secure is TextSecure?, by Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion, by Kerry A. McKay and Poorvi L. Vora - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Non-malleable Reductions and Applications, by Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds, by Maciej Skorski - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Verifiable computation using multiple provers, by Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds, by Dana Dachman-Soled and Jonathan Katz and Vanishree Rao - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks, by Ryotaro Hayashi and Tatsuyuki Matsushita - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Efficiently Making Secure Two-Party Computation Fair, by Handan Kılınç and Alptekin Küpçü - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Interactive Coding for Interactive Proofs, by Yevgeniy Dodis and Allison Bishop Lewko - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings, by Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates, by Markku-Juhani O. Saarinen - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Accelerating Bliss: the geometry of ternary polynomials, by Léo Ducas - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Distributed Cryptography Based on the Proofs of Work, by Marcin Andrychowicz and Stefan Dziembowski - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Hardware Implementation of Secure Shamir's Secret Sharing Scheme , by Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Near Optimal Rate Homomorphic Encryption for Branching Programs, by Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS, by Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots, by İhsan Haluk Akın - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Watch your Constants: Malicious Streebog, by Riham AlTawy and Amr M. Youssef - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Self-Destruct Non-Malleability, by Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, by Koji Nuida and Naoto Itakura and Kaoru Kurosawa - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation, by David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătălin Roşu and Michael Steiner - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability, by Essam Ghadafi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Reflections on Slide with a Twist Attacks, by Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Explicit Non-malleable Codes Resistant to Permutations and Perturbations, by Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework, by Jérémy Jean and Ivica Nikolić and Thomas Peyrin - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures, by Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Three-Level Sieve Algorithm for the Shortest Vector Problem, by Feng Zhang and Yanbin Pan and Gengran Hu - http://eprint.iacr.org/2013...
Crypto, Security, Privacy
Protecting obfuscation against arithmetic attacks, by Eric Miles and Amit Sahai and Mor Weiss - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding, by Andris Ambainis and Ansis Rosmanis and Dominique Unruh - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
FHE Bootstrapping in less than a second, by Léo Ducas and Daniele Micciancio - http://eprint.iacr.org/2014...
Other ways to read this feed:Feed readerFacebook