Index of /~bryan/papers2/security/cryptography
Name
Last modified
Size
Description
Parent Directory
-
How To Construct Random Functions.pdf
2007-09-04 10:32
13M
The possibility of secure non-secret analogue encryption - 1970.pdf
2016-03-08 05:45
5.0M
Interactive oracle proofs - 2016.pdf
2016-03-23 11:32
3.6M
The possibility of secure non-secret digital encryption - 1970.pdf
2016-03-08 05:45
3.5M
Software protection and simulation on oblivious RAMs.pdf
2003-11-10 08:22
3.3M
Guide to elliptic curve cryptography - 2004.pdf
2012-10-01 11:35
2.6M
TrueSet: Faster verifiable set computations - 2014.pdf
2014-10-26 10:01
2.4M
Secrecy, authentication, and public key systems - Ralph Merkle.pdf
2012-05-25 20:13
1.9M
Imperfect forward secrecy: How Diffie-Hellman fails in practice.pdf
2015-10-15 11:53
1.3M
Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system - US4995082.pdf
2013-07-29 03:53
1.0M
Introduction to post-quantum cryptography - Bernstein.pdf
2008-11-29 12:05
926K
Backdoors in pseudorandom number genrators: possibility and impossibility results - 2016.pdf
2016-06-03 11:14
843K
Quantum resource estimates for computing elliptic curve discrete logarithms - 2017.pdf
2017-06-21 17:17
798K
Scalable zero knowledge via cycles of elliptic curves.pdf
2015-06-05 08:59
735K
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers.pdf
2014-10-21 17:35
694K
Processing analytical queries over encrypted data.pdf
2013-03-28 06:28
632K
Provable security in the real world.pdf
2011-11-15 13:55
630K
Quantum tokens for digital signatures - 2016.pdf
2016-09-29 17:10
629K
Guaranteeing correctness in privacy-friendly outsourcing by certificate validation.pdf
2015-04-15 04:25
627K
Secure communications over insecure channels - Ralph Merkle - 1978.pdf
2010-07-18 14:33
563K
Short Interactive Oracle Proofs with Constant Query Complexity, via Composition and Sumcheck.pdf
2016-03-22 23:29
553K
The wonderful world of global random oracles - 2018.pdf
2018-02-08 14:16
549K
Efficient RNS bases for cryptography.pdf
2015-01-20 23:26
549K
The first collision for full SHA-1 - 2017.pdf
2017-02-23 04:53
518K
Nonce-based cryptography: retaining security when randomness fails - 2016.pdf
2016-03-15 14:03
510K
Distributed cryptography based on proofs of work - 2017.pdf
2014-12-17 12:24
504K
Amicable pairs and aliquot cycles for elliptic curves - 2009.pdf
2009-12-09 10:46
495K
Threshold implementations of small s-boxes.pdf
2015-05-18 06:13
466K
Elliptic curve multiset hash.pdf
2016-01-25 18:01
462K
History-free sequential aggregate signatures.pdf
2012-08-14 00:46
441K
The moral character of cryptographic work - 2015.pdf
2015-12-11 08:51
441K
A multivariable Chinese remainder thoerem - 2005.pdf
2005-01-27 18:30
439K
An analysis of OpenSSL's random number generator - 2016-04-09.pdf
2016-04-09 00:19
439K
Open problems in hash function security - 2015.pdf
2016-01-07 15:13
429K
Proofs of space-time and rational proofs of storage.pdf
2016-01-13 15:09
427K
A guide to fully homomorphic encryption - 2015.pdf
2015-12-14 02:08
425K
Attacks on ECDSA signatures with single-bit nonce bias.pdf
2014-09-25 22:39
413K
Verifying curve25519 software.pdf
2014-10-01 18:16
382K
A formal treatment of backdoored pseudorandom generators.pdf
2016-03-17 09:55
379K
Efficient indifferentiable hashing into ordinary elliptic curves - 2009.pdf
2014-06-03 06:18
363K
How to use indistinguishability obfuscation: deniable encryption, and more.pdf
2014-02-17 08:11
356K
Verifiable ASICs.pdf
2015-12-30 16:52
352K
Accountable-subgroup multisignatures - 2001.pdf
2001-08-29 07:54
318K
A converse to the Atjai-Dwork security proof and its cryptographic implications - 1999.pdf
2016-09-04 21:28
252K
Aggregate and verifiably encrypted signatures from bilinear maps - 2003.pdf
2010-06-04 13:24
236K
Interactive proofs of proximity: Delegating computation in sublinear time.pdf
2014-07-26 00:31
230K
Is the security of quantum cryptography guaranteed by the laws of physics? - djb - 2016.pdf
2016-03-26 17:01
229K
Combining point operation for efficient elliptic curve cryptography scalar multiplication.pdf
2017-08-02 05:14
220K
Practical threshold signatures.pdf
2014-11-09 08:10
210K
The uneasy relationship between mathematics and cryptography.pdf
2008-01-24 10:25
204K
Merkle-Damgard revisited: how to construct a hash function.pdf
2006-01-30 14:20
193K
The brave new world of bodacious assumptions in cryptography.pdf
2010-02-10 05:51
191K
A new ring signature scheme from NTRU lattice.pdf
2015-10-18 08:22
163K
Analysis of simplified variants of sha256.pdf
2016-04-15 19:20
154K
Cryptographic hash functions based on artificial life.pdf
2014-05-22 14:01
150K
An interview with Martin Hellman - 2004.pdf
2014-10-03 16:36
144K
Timelock puzzles in the random oracle model.pdf
2011-06-17 08:55
142K
Mental poker with multi-party computation.pdf
2007-07-20 19:13
127K
How to find smooth parts of integers - djb.pdf
2004-05-10 11:02
126K
Cryptographic assumptions: A position paper.pdf
2015-10-27 14:05
124K
A sufficient condition for key-privacy.pdf
2005-01-07 12:57
117K
A survey of two signature aggregation techniques - 2003.pdf
2010-06-04 13:24
89K
nymserver.pl
2013-08-27 03:44
61K
How to backdoor Diffie-Hellman - 2016.pdf
2016-06-25 04:25
3.0K
url.txt
2017-08-25 11:03
1.7K
post-quantum/
2016-05-26 15:34
-
fhe/
2015-09-17 16:41
-
accumulators/
2017-07-22 14:13
-
Apache/2.4.25 (Debian) Server at diyhpl.us Port 80