Home
Recent
Comments
Search
Login
Search
Search:
Stories
Comments
Order By:
Relevance
Newest
Points
42 results for "domain:eprint.iacr.org"
12
Antikernel - A decentralized, secure, hardware-software, operating system
pdf
compsci
hardware
security
eprint.iacr.org
via
nickpsecurity
1 year ago
|
cached
|
3 comments
3
4
A Formal Security Analysis of the Signal Messaging Protocol
networking
security
eprint.iacr.org
via
pushcx
1 year ago
|
cached
|
no comments
0
8
Λ ∘ λ: Functional Lattice Cryptography
pdf
crypto
haskell
eprint.iacr.org
via
pushcx
1 year ago
|
cached
|
no comments
0
7
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
security
eprint.iacr.org
via
fcbsd
1 year ago
|
cached
|
no comments
0
3
A kilobit hidden SNFS discrete logarithm computation
pdf
crypto
eprint.iacr.org
via
355E3B
1 year ago
|
cached
|
no comments
0
5
Efficient algorithms for supersingular isogeny Diffie-Hellman
☶
pdf
crypto
eprint.iacr.org
via
tedu
2 years ago
|
cached
|
no comments
0
1
A Systematic Analysis of the Juniper Dual EC Incident
pdf
math
security
eprint.iacr.org
via
friendlysock
2 years ago
|
cached
|
no comments
0
7
An Analysis of OpenSSL's Random Number Generator
crypto
security
eprint.iacr.org
via
mulander
2 years ago
|
cached
|
no comments
0
1
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
☶
pdf
security
eprint.iacr.org
via
355E3B
2 years ago
|
cached
|
1 comment
1
4
Cross Processor Cache Attacks
security
eprint.iacr.org
via
kyle
2 years ago
|
cached
|
no comments
0
6
Why is the NSA moving away from ECC?
pdf
security
eprint.iacr.org
via
pushcx
2 years ago
|
cached
|
8 comments
8
4
When Organized Crime Applies Academic Results: A Forensic Analysis of an In-Card Listening Device
☶
pdf
hardware
reversing
security
eprint.iacr.org
via
pushcx
2 years ago
|
cached
|
no comments
0
3
Cross-VM RSA Key Recovery in a Public Cloud
pdf
security
virtualization
eprint.iacr.org
via
jcs
2 years ago
|
cached
|
no comments
0
5
How Secure is TextSecure?
pdf
security
eprint.iacr.org
via
kyle
3 years ago
|
cached
|
1 comment
1
10
Dynamic Searchable Encryption via Blind Storage
pdf
security
eprint.iacr.org
via
kyle
4 years ago
|
cached
|
no comments
0
2
Homomorphic AES Evaluation Using NTRU
pdf
security
eprint.iacr.org
via
kyle
4 years ago
|
cached
|
2 comments
2
1
A Secure Text Messaging Protocol
pdf
security
eprint.iacr.org
via
kyle
4 years ago
|
cached
|
1 comment
1
2
Catena: A Memory-Consuming Password Scrambler
pdf
security
eprint.iacr.org
via
kyle
4 years ago
|
cached
|
1 comment
1
3
Elliptic Curve Cryptography in Practice
pdf
security
eprint.iacr.org
via
pedro
4 years ago
|
cached
|
no comments
0
2
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
security
eprint.iacr.org
via
kyle
5 years ago
|
cached
|
3 comments
3
Page:
1
2
3