default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,499 matches
- 2019
- Kaushik Nath, Palash Sarkar:
Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level. IACR Cryptol. ePrint Arch. 2019: 1361 (2019) - Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving. IACR Cryptol. ePrint Arch. 2019: 9 (2019) - Qian Guo, Thomas Johansson, Alexander Nilsson:
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke. IACR Cryptol. ePrint Arch. 2019: 43 (2019) - Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. IACR Cryptol. ePrint Arch. 2019: 63 (2019) - Jun Furukawa, Yehuda Lindell:
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest. IACR Cryptol. ePrint Arch. 2019: 658 (2019) - Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto:
Evaluation of Code-based Signature Schemes. IACR Cryptol. ePrint Arch. 2019: 544 (2019) - Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2019: 583 (2019) - David Butler, David Aspinall, Adrià Gascón:
Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL. IACR Cryptol. ePrint Arch. 2019: 1449 (2019) - Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. IACR Cryptol. ePrint Arch. 2019: 50 (2019) - Pedro Branco:
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions. IACR Cryptol. ePrint Arch. 2019: 98 (2019) - Pedro Branco, Manuel Goulão, Paulo Mateus:
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions. IACR Cryptol. ePrint Arch. 2019: 529 (2019) - Hao Chen, Ilaria Chillotti, Yongsoo Song:
Multi-Key Homomophic Encryption from TFHE. IACR Cryptol. ePrint Arch. 2019: 116 (2019) - Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. IACR Cryptol. ePrint Arch. 2019: 524 (2019) - Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas:
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-. IACR Cryptol. ePrint Arch. 2019: 644 (2019) - Rodrigo Abarzúa, Claudio Valencia Cordero, Julio López:
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC. IACR Cryptol. ePrint Arch. 2019: 10 (2019) - Michel Abdalla, Manuel Barbosa:
Perfect Forward Security of SPAKE2. IACR Cryptol. ePrint Arch. 2019: 1194 (2019) - Michel Abdalla, Fabrice Benhamouda, Romain Gay:
From Single-Input to Multi-Client Inner-Product Functional Encryption. IACR Cryptol. ePrint Arch. 2019: 487 (2019) - Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner:
Decentralizing Inner-Product Functional Encryption. IACR Cryptol. ePrint Arch. 2019: 20 (2019) - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
DL-Extractable UC-Commitment Schemes. IACR Cryptol. ePrint Arch. 2019: 201 (2019) - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
UC-Secure CRS Generation for SNARKs. IACR Cryptol. ePrint Arch. 2019: 471 (2019) - Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig:
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing. IACR Cryptol. ePrint Arch. 2019: 1063 (2019) - Ameera Salem Al Abdouli, Emanuele Bellini, Florian Caullery, Marcos Manzano, Víctor Mateu:
Rank-metric Encryption on Arm-Cortex M0. IACR Cryptol. ePrint Arch. 2019: 1274 (2019) - Masayuki Abe, Miguel Ambrona, Miyako Ohkubo:
Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments. IACR Cryptol. ePrint Arch. 2019: 696 (2019) - Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Private PEZ Protocols for Symmetric Functions. IACR Cryptol. ePrint Arch. 2019: 1069 (2019) - Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang:
Shorter QA-NIZK and SPS with Tighter Security. IACR Cryptol. ePrint Arch. 2019: 1284 (2019) - Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin:
Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness. IACR Cryptol. ePrint Arch. 2019: 270 (2019) - Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan:
Efficient Information-Theoretic Secure Multiparty Computation over ℤ/pk ℤ via Galois Rings. IACR Cryptol. ePrint Arch. 2019: 872 (2019) - Mark Abspoel, Anders P. K. Dalskov, Daniel Escudero, Ariel Nof:
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings. IACR Cryptol. ePrint Arch. 2019: 1298 (2019) - Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter:
Reversible Proofs of Sequential Work. IACR Cryptol. ePrint Arch. 2019: 252 (2019) - Anasuya Acharya, Manoj Prabhakaran, Akash Trehan:
CellTree: A New Paradigm for Distributed Data Repositories. IACR Cryptol. ePrint Arch. 2019: 516 (2019)
skipping 1,469 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-21 16:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint