Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: IACR Cryptology ePrint Archive
    Year: 2012
    Volume: 2012
    DBLP: db/journals/iacr/iacr2012.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 731  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang.
    ECC2K-130 on NVIDIA GPUs.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Andrew Chi-Chih Yao, Yunlei Zhao.
    Digital Signatures from Challenge-Divided Sigma-Protocols.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn.
    Malleable Proof Systems and Applications.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Charanjit S. Jutla, Moti Yung.
    PayTree: "Amortized Signature" for Flexible Micro-Payments.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian.
    On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Mihir Bellare, Stefano Tessaro, Alexander Vardy.
    A Cryptographic Treatment of the Wiretap Channel.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Kazuhiko Minematsu, Hiraku Morita, Tetsu Iwata.
    Cryptanalysis of EAXprime.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Yusuke Naito.
    On the Indifferentiable Hash Functions in the Multi-Stage Security Games.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Mihir Bellare, Stefano Tessaro.
    Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Daniel J. Bernstein, Tanja Lange.
    The new SHA-3 software shootout.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Show item 1 to 10 of 731  

    Your query returned 731 matches in the database.