Index of /~bryan/papers2/security/cryptography

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[TXT]url.txt2017-08-25 11:03 1.7K 
[DIR]post-quantum/2016-05-26 15:34 -  
[TXT]nymserver.pl2013-08-27 03:44 61K 
[DIR]fhe/2015-09-17 16:41 -  
[DIR]accumulators/2017-07-22 14:13 -  
[   ]Verifying curve25519 software.pdf2014-10-01 18:16 382K 
[   ]Verifiable ASICs.pdf2015-12-30 16:52 352K 
[   ]TrueSet: Faster verifiable set computations - 2014.pdf2014-10-26 10:01 2.4M 
[   ]Timelock puzzles in the random oracle model.pdf2011-06-17 08:55 142K 
[   ]Threshold implementations of small s-boxes.pdf2015-05-18 06:13 466K 
[   ]The wonderful world of global random oracles - 2018.pdf2018-02-08 14:16 549K 
[   ]The uneasy relationship between mathematics and cryptography.pdf2008-01-24 10:25 204K 
[   ]The possibility of secure non-secret digital encryption - 1970.pdf2016-03-08 05:45 3.5M 
[   ]The possibility of secure non-secret analogue encryption - 1970.pdf2016-03-08 05:45 5.0M 
[   ]The moral character of cryptographic work - 2015.pdf2015-12-11 08:51 441K 
[   ]The first collision for full SHA-1 - 2017.pdf2017-02-23 04:53 518K 
[   ]The brave new world of bodacious assumptions in cryptography.pdf2010-02-10 05:51 191K 
[   ]Software protection and simulation on oblivious RAMs.pdf2003-11-10 08:22 3.3M 
[   ]Short Interactive Oracle Proofs with Constant Query Complexity, via Composition and Sumcheck.pdf2016-03-22 23:29 553K 
[   ]Secure communications over insecure channels - Ralph Merkle - 1978.pdf2010-07-18 14:33 563K 
[   ]Secrecy, authentication, and public key systems - Ralph Merkle.pdf2012-05-25 20:13 1.9M 
[   ]Scalable zero knowledge via cycles of elliptic curves.pdf2015-06-05 08:59 735K 
[   ]SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers.pdf2014-10-21 17:35 694K 
[   ]Quantum tokens for digital signatures - 2016.pdf2016-09-29 17:10 629K 
[   ]Quantum resource estimates for computing elliptic curve discrete logarithms - 2017.pdf2017-06-21 17:17 798K 
[   ]Provable security in the real world.pdf2011-11-15 13:55 630K 
[   ]Proofs of space-time and rational proofs of storage.pdf2016-01-13 15:09 427K 
[   ]Processing analytical queries over encrypted data.pdf2013-03-28 06:28 632K 
[   ]Practical threshold signatures.pdf2014-11-09 08:10 210K 
[   ]Open problems in hash function security - 2015.pdf2016-01-07 15:13 429K 
[   ]Nonce-based cryptography: retaining security when randomness fails - 2016.pdf2016-03-15 14:03 510K 
[   ]Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system - US4995082.pdf2013-07-29 03:53 1.0M 
[   ]Merkle-Damgard revisited: how to construct a hash function.pdf2006-01-30 14:20 193K 
[   ]Mental poker with multi-party computation.pdf2007-07-20 19:13 127K 
[   ]Is the security of quantum cryptography guaranteed by the laws of physics? - djb - 2016.pdf2016-03-26 17:01 229K 
[   ]Introduction to post-quantum cryptography - Bernstein.pdf2008-11-29 12:05 926K 
[   ]Interactive proofs of proximity: Delegating computation in sublinear time.pdf2014-07-26 00:31 230K 
[   ]Interactive oracle proofs - 2016.pdf2016-03-23 11:32 3.6M 
[   ]Imperfect forward secrecy: How Diffie-Hellman fails in practice.pdf2015-10-15 11:53 1.3M 
[   ]How to use indistinguishability obfuscation: deniable encryption, and more.pdf2014-02-17 08:11 356K 
[   ]How to find smooth parts of integers - djb.pdf2004-05-10 11:02 126K 
[   ]How to backdoor Diffie-Hellman - 2016.pdf2016-06-25 04:25 3.0K 
[   ]How To Construct Random Functions.pdf2007-09-04 10:32 13M 
[   ]History-free sequential aggregate signatures.pdf2012-08-14 00:46 441K 
[   ]Guide to elliptic curve cryptography - 2004.pdf2012-10-01 11:35 2.6M 
[   ]Guaranteeing correctness in privacy-friendly outsourcing by certificate validation.pdf2015-04-15 04:25 627K 
[   ]Elliptic curve multiset hash.pdf2016-01-25 18:01 462K 
[   ]Efficient indifferentiable hashing into ordinary elliptic curves - 2009.pdf2014-06-03 06:18 363K 
[   ]Efficient RNS bases for cryptography.pdf2015-01-20 23:26 549K 
[   ]Distributed cryptography based on proofs of work - 2017.pdf2014-12-17 12:24 504K 
[   ]Cryptographic hash functions based on artificial life.pdf2014-05-22 14:01 150K 
[   ]Cryptographic assumptions: A position paper.pdf2015-10-27 14:05 124K 
[   ]Combining point operation for efficient elliptic curve cryptography scalar multiplication.pdf2017-08-02 05:14 220K 
[   ]Backdoors in pseudorandom number genrators: possibility and impossibility results - 2016.pdf2016-06-03 11:14 843K 
[   ]Attacks on ECDSA signatures with single-bit nonce bias.pdf2014-09-25 22:39 413K 
[   ]A survey of two signature aggregation techniques - 2003.pdf2010-06-04 13:24 89K 
[   ]A sufficient condition for key-privacy.pdf2005-01-07 12:57 117K 
[   ]An interview with Martin Hellman - 2004.pdf2014-10-03 16:36 144K 
[   ]A new ring signature scheme from NTRU lattice.pdf2015-10-18 08:22 163K 
[   ]An analysis of OpenSSL's random number generator - 2016-04-09.pdf2016-04-09 00:19 439K 
[   ]Analysis of simplified variants of sha256.pdf2016-04-15 19:20 154K 
[   ]A multivariable Chinese remainder thoerem - 2005.pdf2005-01-27 18:30 439K 
[   ]Amicable pairs and aliquot cycles for elliptic curves - 2009.pdf2009-12-09 10:46 495K 
[   ]A guide to fully homomorphic encryption - 2015.pdf2015-12-14 02:08 425K 
[   ]Aggregate and verifiably encrypted signatures from bilinear maps - 2003.pdf2010-06-04 13:24 236K 
[   ]A formal treatment of backdoored pseudorandom generators.pdf2016-03-17 09:55 379K 
[   ]A converse to the Atjai-Dwork security proof and its cryptographic implications - 1999.pdf2016-09-04 21:28 252K 
[   ]Accountable-subgroup multisignatures - 2001.pdf2001-08-29 07:54 318K 

Apache/2.4.25 (Debian) Server at diyhpl.us Port 80