Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: IACR Cryptology ePrint Archive
    Year: 2014
    Volume: 2014
    DBLP: db/journals/iacr/iacr2014.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 1116  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yehuda Lindell.
    An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Martin M. Lauridsen.
    Improved Linear Cryptanalysis of Round Reduced SIMON.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Christian Hanser, Daniel Slamanig.
    Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Mohammad Wazid.
    Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai.
    Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Gustavo Banegas.
    Attacks in Stream Ciphers: A Survey.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Ömer Egecioglu, Çetin Kaya Koç.
    Reducing the Complexity of Normal Basis Multiplication.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Xiaochao Qian.
    PoS Cryptocurrency wtih No Blockchain.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Jorge Munilla, Mike Burmester, Alberto Peinado.
    Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish.
    Efficient RAM and control flow in verifiable outsourced computation.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Show item 1 to 10 of 1116  

    Your query returned 1116 matches in the database.