File Search Engine
  • Search
  • Syntax
  • Fields
  • API
  • iacr.steepath.eu · 1176-LeakageofSignalfunctionwithreusedkeysinRLWEkeyexchange.pdf

    /2016/

    France · Association GRIFON

    SHA1: 94d2c98a2b2cf6f2306a78c11160ceb3cc0f21da
    SHA256: 29d87080c70449adb9abd6103ea95f7894918a746d487135789b1c4dfbf7d12d
    application/pdf
    274.97KB
    2016-12-30 23:00:20 +0000 UTC

  • iacr.steepath.eu · 1175-OntheSecurityNotionsforHomomorphicSignatures.pdf

    /2016/

    France · Association GRIFON

    SHA1: e343c7816949b9e13c1423ef074ce7c0fccec32e
    SHA256: d9d62c965398f66d590682c0a17c32724b10c1caf1fc7e53eb7be7680bd6425e
    application/pdf
    374.41KB
    2016-12-30 23:00:22 +0000 UTC

  • iacr.steepath.eu · 1174-RevisitingFullPRFSecurePMACandUsingItforBeyondBirthdayAuthenticatedEncryption.pdf

    /2016/

    France · Association GRIFON

    SHA1: 3c0372787609703815c7acaf0d12c20bfef9f956
    SHA256: eda13c248fa46b0c0f61dd8ca8bd0fbbbc32b340fa1542cba8715534114adcfe
    application/pdf
    309.39KB
    2016-12-28 23:00:05 +0000 UTC

  • iacr.steepath.eu · 1173-ConstructionofLightweightMDSMatricesovertheMatrixPolynomialResidueRing.pdf

    /2016/

    France · Association GRIFON

    SHA1: f21e9b38ad9988e3c84da2b51da4c9816d3a5429
    SHA256: b0d88bd72721ab80b558b92d7d3d86ad666f4b9b645b1d1e5cdb99946f51630e
    application/pdf
    360.19KB
    2023-01-20 08:16:06 +0000 UTC

  • iacr.steepath.eu · 1173-ConstructionofLightweightMDSMatricesoverMatrixPolynomialResidueRing.pdf

    /2016/

    France · Association GRIFON

    SHA1: b7c0b011301963658f88175398687d22008ede1d
    SHA256: 36e93f1ce621bc7b5f682e7d14647ed26801b893f28d873c5824ae01d3eab27e
    application/pdf
    56.30KB
    2016-12-28 23:00:06 +0000 UTC

  • iacr.steepath.eu · 1172-OntheProvableSecurityoftheTweakableEvenMansourCipherAgainstMultiKeyandRelatedKeyAttacks.pdf

    /2016/

    France · Association GRIFON

    SHA1: 014639d5d5cde265e48b8607ec9f785b31435d33
    SHA256: 06f9aa388142dd61a6c09b32bcfd91cb5499f0266814cef67bca27a59ec741a1
    application/pdf
    208.73KB
    2016-12-28 23:00:08 +0000 UTC

  • iacr.steepath.eu · 1171-ASaladofBlockCiphers.pdf

    /2016/

    France · Association GRIFON

    SHA1: 7d9e678e0364119715fa68ccdd785597ab727dce
    SHA256: 5e235c3beb47d69651c9b53569de6929f9b0c8a674d7b4c4bc65f7178644d7cf
    application/pdf
    2.58MB
    2016-12-28 23:00:11 +0000 UTC

  • iacr.steepath.eu · 1170-ImpossibleDifferentialandBoomerangCryptanalysisofRoundReducedKiasuBC.pdf

    /2016/

    France · Association GRIFON

    SHA1: 114da90754e48ba577ed1c07d44caa0b14d94b42
    SHA256: 83fc9643f5cb6c021f7d627efd6b47609be082e06e2a49c7af8537c5118b4603
    application/pdf
    448.33KB
    2016-12-28 23:00:13 +0000 UTC

  • iacr.steepath.eu · 117-CircularSecuritySeparationsforArbitraryLengthCyclesfromLWE.pdf

    /2016/

    France · Association GRIFON

    SHA1: dcf6508163185ae56959bce560f66760cc038732
    SHA256: b32ac753f3d212d578f7e245174d313da68eed1a36f9daf588a2ceb26bfbd910
    application/pdf
    428.15KB
    2016-08-07 22:01:01 +0000 UTC

  • iacr.steepath.eu · 117-CircularSecurityCounterexamplesforArbitraryLengthCyclesfromLWE.pdf

    /2016/

    France · Association GRIFON

    SHA1: 4b57ac6d9032f7e5d81cf58a0366c41d3655bbf5
    SHA256: 34507adf04f79570fe340e650837ee16853f43cb178723ed60312a9994785951
    application/pdf
    419.51KB
    2016-02-11 23:00:06 +0000 UTC

  • iacr.steepath.eu · 1169-LWEfromNoncommutativeGroupRings.pdf

    /2016/

    France · Association GRIFON

    SHA1: 493ab1e3d8bec1a89cbd02b3e35b5006104772cf
    SHA256: 5573f06fe2e14b859e6f02dd57f6d7ca4b111b9f7faa351eee5bccc3dd302f0d
    application/pdf
    313.36KB
    2016-12-28 23:00:14 +0000 UTC

  • iacr.steepath.eu · 1168-GenericZeroKnowledgeandMultivariateQuadraticSystems.pdf

    /2016/

    France · Association GRIFON

    SHA1: 06c8ea507b2c4aaf7b421bd0c93e6145e3ff7517
    SHA256: 5ad14e814da5a960fad4aedae8a4d405eb8bf4d1555d54b16b4192d5407d46d6
    application/pdf
    509.94KB
    2016-12-28 23:00:16 +0000 UTC

  • iacr.steepath.eu · 1167-MobileCommerceSecureMultipartyComputationampFinancialCryptography.pdf

    /2016/

    France · Association GRIFON

    SHA1: a30f787c18032352bfb383c0f344793c1d371622
    SHA256: fb6fc9a274629cb3b38ae4d70d8c10d8e5b46c29fb8bd488048298a11c4f0e52
    application/pdf
    298.52KB
    2023-01-20 08:16:08 +0000 UTC

  • iacr.steepath.eu · 1167-MobileCommerceSecureMultipartyComputationFinancialCryptography.pdf

    /2016/

    France · Association GRIFON

    SHA1: a30f787c18032352bfb383c0f344793c1d371622
    SHA256: fb6fc9a274629cb3b38ae4d70d8c10d8e5b46c29fb8bd488048298a11c4f0e52
    application/pdf
    298.52KB
    2016-12-28 23:00:18 +0000 UTC

  • iacr.steepath.eu · 1166-Groupkeyexchangeprotocolswithstandingephemeralkeyreveals.pdf

    /2016/

    France · Association GRIFON

    SHA1: 2747a198a82891ceb72928f70e9bc21fc4a0ec5c
    SHA256: c70960a05d9aadc90cf742b8e187f0120f38e57944300f35b90dd720e2dc1720
    application/pdf
    404.59KB
    2016-12-28 23:00:19 +0000 UTC

  • iacr.steepath.eu · 1165-EfficientTransparentRedactableSignatureswithaSingleSignatureInvocation.pdf

    /2016/

    France · Association GRIFON

    SHA1: 08c3328dc013fa8fae889f5385a7ec50216df2ca
    SHA256: 51229ba09f8604358aea36d01b23f141b5e30a40374317893e3608f36f28d85e
    application/pdf
    507.81KB
    2016-12-28 23:00:21 +0000 UTC

  • iacr.steepath.eu · 1164-AttackingFHEbasedapplicationsbysoftwarefaultinjections.pdf

    /2016/

    France · Association GRIFON

    SHA1: 3fea82ef99a8c0d9a54af776aa89b1cafaf4d0b0
    SHA256: 8e0888a3bbff2cdf03bc5716e0e1e43cf1abdf17443f536b0f1244c48372300d
    application/pdf
    322.54KB
    2016-12-28 23:00:23 +0000 UTC

  • iacr.steepath.eu · 1163-UsingFullyHomomorphicEncryptionforStatisticalAnalysisofCategoricalOrdinalandNumericalData.pdf

    /2016/

    France · Association GRIFON

    SHA1: 16d7ab5f2956503d9c23f9963901b4003e5c5776
    SHA256: 0e9e1c2edbc8e964ba82fec7c3e6ab031ba25e5f22541db4813f7bdf64969258
    application/pdf
    594.31KB
    2016-12-28 23:00:24 +0000 UTC

  • iacr.steepath.eu · 1162-MeetintheMiddleAttacksonClassesofContractingandExpandingFeistelConstructions.pdf

    /2016/

    France · Association GRIFON

    SHA1: e816e5d375fc2dcbfb7f59229806c33da059f180
    SHA256: 21961b3508ee2550e80b6864b2919c3a3c53f7c30041b76502f8843c375dad1e
    application/pdf
    987.14KB
    2016-12-28 23:00:27 +0000 UTC

  • iacr.steepath.eu · 1161-ImpossibleDifferentialAttackonSimpirav2.pdf

    /2016/

    France · Association GRIFON

    SHA1: e0504002bc0b4e45242b90bf898726c898fd8921
    SHA256: 5939871b2e59495e3b56f51b2ede16a71110ef4ec102caa2eefa47d79b038262
    application/pdf
    602.27KB
    2016-12-28 23:00:29 +0000 UTC