Long pages

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems ‎[141,454 bytes]
  2. (hist) ‎Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing ‎[111,930 bytes]
  3. (hist) ‎The Semi-Generic Group Model and Applications to Pairing-Based Cryptography ‎[105,351 bytes]
  4. (hist) ‎SoK: Secure Messaging ‎[103,617 bytes]
  5. (hist) ‎HDD (Hard Disk Drive) ‎[87,698 bytes]
  6. (hist) ‎Domain Extension for MACs Beyond the Birthday Barrier ‎[83,619 bytes]
  7. (hist) ‎Improved Generic Algorithms for Hard Knapsacks ‎[81,418 bytes]
  8. (hist) ‎Distance Hijacking Attacks on Distance Bounding Protocols ‎[79,933 bytes]
  9. (hist) ‎Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions ‎[78,545 bytes]
  10. (hist) ‎P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets ‎[77,857 bytes]
  11. (hist) ‎Efficient Public-Key Cryptography in the Presence of Key Leakage ‎[77,290 bytes]
  12. (hist) ‎On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields ‎[77,006 bytes]
  13. (hist) ‎Effcient Non-Interactive Secure Computation ‎[76,597 bytes]
  14. (hist) ‎On the Feasibility of Consistent Computations ‎[76,571 bytes]
  15. (hist) ‎Leftover Hash Lemma, Revisited ‎[76,436 bytes]
  16. (hist) ‎Concurrent composition in the bounded quantum storage model ‎[76,086 bytes]
  17. (hist) ‎Identity-Based Aggregate and Multi-Signature Schemes Based on RSA ‎[75,903 bytes]
  18. (hist) ‎Short Pairing-Based Non-interactive Zero-Knowledge Arguments ‎[75,888 bytes]
  19. (hist) ‎Zerocoin Anonymous Distributed E-Cash from Bitcoin ‎[74,103 bytes]
  20. (hist) ‎Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 ‎[74,021 bytes]
  21. (hist) ‎Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes ‎[73,107 bytes]
  22. (hist) ‎Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation ‎[72,849 bytes]
  23. (hist) ‎Fully Leakage-Resilient Signatures ‎[70,318 bytes]
  24. (hist) ‎Memory Delegation ‎[69,492 bytes]
  25. (hist) ‎Position-Based Quantum Cryptography: Impossibility and Constructions ‎[69,111 bytes]
  26. (hist) ‎Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model ‎[68,492 bytes]
  27. (hist) ‎Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities ‎[68,369 bytes]
  28. (hist) ‎Constant-Size Commitments to Polynomials and Their Applications ‎[68,224 bytes]
  29. (hist) ‎Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments ‎[67,951 bytes]
  30. (hist) ‎Cryptography with Tamperable and Leaky Memory ‎[67,610 bytes]
  31. (hist) ‎Optimal Verification of Operations on Dynamic Sets ‎[66,222 bytes]
  32. (hist) ‎Classical Cryptographic Protocols in a Quantum World ‎[66,146 bytes]
  33. (hist) ‎Implementing Gentry's Fully-Homomorphic Encryption Scheme ‎[65,465 bytes]
  34. (hist) ‎Security of Encryption Schemes in Weakened Random Oracle Models ‎[64,979 bytes]
  35. (hist) ‎Structured Encryption and Controlled Disclosure ‎[64,879 bytes]
  36. (hist) ‎A Group Signature Scheme from Lattice Assumptions ‎[64,659 bytes]
  37. (hist) ‎Leakage-Resilient Zero Knowledge ‎[64,165 bytes]
  38. (hist) ‎Efficient arithmetic on Hessian curves ‎[64,126 bytes]
  39. (hist) ‎Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem ‎[63,597 bytes]
  40. (hist) ‎Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions ‎[62,668 bytes]
  41. (hist) ‎Adaptive Pseudo-Free Groups and Applications ‎[62,609 bytes]
  42. (hist) ‎A Closer Look at Anonymity and Robustness in Encryption Schemes ‎[61,274 bytes]
  43. (hist) ‎Highly-Efficient Universally-Composable Commitments based on the DDH Assumption ‎[59,861 bytes]
  44. (hist) ‎Generic Compilers for Authenticated Key Exchange ‎[59,810 bytes]
  45. (hist) ‎Secret Keys from Channel Noise ‎[59,148 bytes]
  46. (hist) ‎HDFS (Hadoop Distributed Filesystem) ‎[57,993 bytes]
  47. (hist) ‎A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices ‎[57,989 bytes]
  48. (hist) ‎Decentralizing Attribute-Based Encryption ‎[57,566 bytes]
  49. (hist) ‎Collision Attacks against the Knudsen-Preneel Compression Functions ‎[56,393 bytes]
  50. (hist) ‎Random Oracle Reducibility ‎[56,167 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)