Active
Recent
Comments
Search
Login
Login
eprint.iacr.org: 89 stories from 39 submitters
1
CCA secure ElGamal encryption over an integer group where ICDH assumption holds
pdf
cryptography
eprint.iacr.org
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
4
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
☶
pdf
hardware
ios
reversing
security
eprint.iacr.org
via
calvin
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
How to Backdoor a Cipher
cryptography
eprint.iacr.org
via
crazyloglad
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
9
"This destroyes the RSA cryptosystem" (by proving polynomial time bound on integer factorization)
cryptography
math
eprint.iacr.org
via
petergao
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
1
On the (in)security of ROS
☶
pdf
cryptography
eprint.iacr.org
via
mz
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks
pdf
security
eprint.iacr.org
via
fro
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Dedicated Security Chips in the Age of Secure Enclaves
cryptography
hardware
eprint.iacr.org
via
xorhash
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Too much crypto
☶
pdf
cryptography
eprint.iacr.org
via
calvin
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers
☶
pdf
cryptography
formalmethods
security
eprint.iacr.org
via
nickpsecurity
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Formal Verification of a Constant-Time Preserving C Compiler
formalmethods
eprint.iacr.org
via
sanxiyn
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
19
Using SMT Solvers to Automate Chosen Ciphertext Attacks
☶
cryptography
security
eprint.iacr.org
authored by
mz
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
9
Does "www." Mean Better Transport Layer Security?
cryptography
security
eprint.iacr.org
via
classichasclass
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Key Extraction Using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
pdf
hardware
security
eprint.iacr.org
via
calvin
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
On Post-Compromise Security
☶
pdf
cryptography
formalmethods
security
eprint.iacr.org
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
21
An Analysis of the ProtonMail Cryptographic Architecture
cryptography
security
eprint.iacr.org
authored by
nadim
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
17
Cryptography during the French and American wars in Vietnam
pdf
cryptography
historical
eprint.iacr.org
via
friendlysock
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
5
Cryptanalysis of OCB2
cryptography
security
eprint.iacr.org
via
trn
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
☶
pdf
cryptography
security
eprint.iacr.org
via
mz
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Zexe: Enabling Decentralized Private Computation
☶
pdf
cryptography
programming
security
eprint.iacr.org
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Prime and Prejudice: Primality Testing Under Adversarial Conditions
cryptography
eprint.iacr.org
via
bargap
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
cryptography
security
eprint.iacr.org
via
ceh
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
HPolyC: length-preserving encryption for entry-level processors
☶
cryptography
python
eprint.iacr.org
via
ceh
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
uMine: a Blockchain based on Human Miners
merkle-trees
eprint.iacr.org
via
lainon
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Public Accountability vs. Secret Laws: Can They Coexist?
cryptography
eprint.iacr.org
via
lainon
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Ledger Language Design: Designing and Deploying Formally Verified Public Ledgers
pdf
formalmethods
merkle-trees
plt
eprint.iacr.org
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
<< Page 1
|
Page 3 >>