Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Crypto, Security, Privacy

Crypto, Security, Privacy

Cryptography, Security, Privacy
Crypto, Security, Privacy
Succinct Randomized Encodings and their Applications, by Nir Bitansky and Sanjam Garg and Sidharth Telang - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation, by Takaaki Mizuki and Yu-ichi Hayashi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Authenticated Key Exchange from Ideal Lattices, by Jiang Zhang and Zhenfeng Zhang and Jintai Ding and Michael Snook and {\"O}zg{\"u}r Dagdelen - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin clients, by Arthur Gervais and Ghassan O. Karame and Damian Gruber and Srdjan Capkun - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Access Control in Publicly Verifiable Outsourced Computation, by James Alderman and Carlos Cid and Jason Crampton and Christian Janson - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
The Bitcoin Backbone Protocol: Analysis and Applications, by Juan Garay and Aggelos Kiayias and Nikos Leonardos - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Algebraic Attacks on Human Identification Protocols, by Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Dali Kaafar and Josef Pieprzyk - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Succinct Garbling Schemes and Applications, by Huijia Lin and Rafael Pass - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Indistinguishability Obfuscation of Iterated Circuits and RAM Programs, by Ran Canetti and Justin Holmgren and Abhishek Jain and Vinod Vaikuntanathan - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation, by Han Jiang and Xiaochao Wei and Chuan Zhao and Qiuliang Xu - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin, by Jens Groth and Markulf Kohlweiss - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Cryptanalysis of Reduced-round SIMON32 and SIMON48, by Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Note on Quantum Security for Post-Quantum Cryptography, by Fang Song - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms, by Bo Zhu and Xinxin Fan and Guang Gong - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Montgomery Modular Multiplication on ARM-NEON Revisited, by Hwajeong Seo, Zhe Liu, Johann Groschadl, Jongseok Choi, and Howon Kim - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Decoy-based information security, by Vladimir Shpilrain - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards, by Ding Wang and Ping Wang - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Computing Mod Without Mod, by Mark A. Will and Ryan K. L. Ko - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle, by Yehuda Lindell - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Non-existence of [n; 5] type Generalized Bent function., by Shashi Kant Pandey and P.R Mishra and B.K Dass - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A comprehensive empirical comparison of parallel ListSieve and GaussSieve, by Artur Mariano and Ozgur Dagdelen and Christian Bischof - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Simulatable Leakage: Analysis, Pitfalls, and new Constructions, by J. Longo Galea and D. Martin and E. Oswald and D. Page and M. Stam and and M. Tunstall - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Implementation and improvement of the Partial Sum Attack on 6-round AES, by Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Hardware Trojan Horses in Cryptographic IP Cores, by Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version), by Anne Canteaut and Thomas Fuhr and Henri Gilbert and María Naya-Plasencia and Jean-René Reinhard - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A Practical Iterative Side Channel Cube Attack on AES-128/256, by Erfan Aghaee and Majid Rahimi and Hamed Yusefi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Resizable Tree-Based Oblivious RAM, by Tarik Moataz and Travis Mayberry and Erik-Oliver Blass - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
How to Efficiently Evaluate RAM Programs with Malicious Security, by Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Augmented Learning with Errors: The Untapped Potential of the Error Term, by Rachid El Bansarkhani and Özgür Dagdelen and Johannes Buchmann - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Sieving for shortest vectors in lattices using angular locality-sensitive hashing, by Thijs Laarhoven - http://eprint.iacr.org/2014...
Other ways to read this feed:Feed readerFacebook