Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Crypto, Security, Privacy

Crypto, Security, Privacy

Cryptography, Security, Privacy
Crypto, Security, Privacy
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, by Koji Nuida and Kaoru Kurosawa - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model, by Ronald Cramer and Carles Padr{\'o} and Chaoping Xing - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources, by Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing - http://eprint.iacr.org/2013...
Crypto, Security, Privacy
On the value of encrypting your phone - https://freedom-to-tinker.com/blog...
Crypto, Security, Privacy
Guessing passwords with Apple’s full-device encryption - https://freedom-to-tinker.com/blog...
Crypto, Security, Privacy
Weak Instances of PLWE, by Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Deterministic Public-Key Encryption under Continual Leakage, by Venkata Koppula,Omkant Pandey,Yannis Rouselakis,Brent Waters - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis, by Raghavan Kumar and Philipp Jovanovic and Ilia Polian - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Simple-looking joint decoders for traitor tracing and group testing, by Boris Skoric - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Tuning GaussSieve for Speed, by Robert Fitzpatrick and Christian Bischof and Johannes Buchmann and Ozgur Dagdelen and Florian Gopfert and Artur Mariano and Bo-Yin Yang - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Divisible E-Cash Made Practical, by Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Implementing Cryptographic Program Obfuscation, by Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware, by Raghavan Kumar and Philipp Jovanovic and Wayne Burleson and Ilia Polian - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Anonymous IBE from Quadratic Residuosity with Improved Performance, by Michael Clear and Hitesh Tewari and Ciar\'{a}n McGoldrick - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps, by Seunghwan Park and Kwangsu Lee and Dong Hoon Lee - http://eprint.iacr.org/2013...
Crypto, Security, Privacy
Another Tor is possible, by Amadou Moctar Kane - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation, by Chun Guo and Dongdai Lin - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Statistical Properties of the Square Map Modulo a Power of Two, by S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Speaking Truth to Parallelism at Cornell - http://www.scottaaronson.com/blog...
Crypto, Security, Privacy
Analysis of NORX: Investigating Differential and Rotational Properties, by Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Key Derivation From Noisy Sources With More Errors Than Entropy, by Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam Smith - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Compact and Side Channel Secure Discrete Gaussian Sampling, by Sujoy Sinha Roy and Oscar Reparaz and Frederik Vercauteren and Ingrid Verbauwhede - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps, by Nuttapong Attrapadung - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
How to Obfuscate Programs Directly, by Joe Zimmerman - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation, by Artur Mariano, Shahar Timnat and Christian Bischof - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Obfuscating Low-Rank Matrix Branching Programs, by Amit Sahai and Mark Zhandry - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Automated Analysis and Synthesis of Block-Cipher Modes of Operation, by Alex J. Malozemoff and Jonathan Katz and Matthew D. Green - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Succinct Randomized Encodings and their Applications, by Nir Bitansky and Sanjam Garg and Sidharth Telang - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Algebraic Attacks on Human Identification Protocols, by Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Dali Kaafar and Josef Pieprzyk - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Succinct Garbling Schemes and Applications, by Huijia Lin and Rafael Pass - http://eprint.iacr.org/2014...
Other ways to read this feed:Feed readerFacebook