International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 30000 results
A Verifiable Random Function with Short Proofs and Keys
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=3320
Yevgeniy Dodis Aleksandr Yampolskiy
Pkc 2005
A Verifiable Random Function With Short Proofs and Keys
Eprint
https://eprint.iacr.org/2004/310
Yevgeniy Dodis Aleksandr Yampolskiy
We give a simple and efficient construction of a verifiable random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [MRV99, Lys02], it avoids using an inefficient...
last revised 7 Mar 2005
Threshold and Proactive Pseudo-Random Permutations
Eprint
https://eprint.iacr.org/2006/017
Yevgeniy Dodis Aleksandr Yampolskiy Moti Yung
We construct a reasonably efficient threshold and proactive pseudo-random permutation (PRP). Our protocol needs only O(1) communication rounds. It tolerates up to (n-1)/2 of n dishonest servers in the semi-honest environment....
received 14 Jan 2006
Conference Program
https://iacr.org/workshops/pkc2005.dir/pkc05/program.html
Main place Conference Program Call for papers Social Program Conference Venue Registration Accommodation Contact Conference Program The scientific program and included breaks will be held at the Congress House. A welcome drink...
Public-Key Cryptography 2005
https://iacr.org/archive/pkc2005/pkc2005.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project Public-Key Cryptography 2005 Les Diablerets, Switzerland Serge Vaudenay (Ed.): Public Key Cryptography - PKC 2005, 8th...
Threshold and Proactive Pseudo-Random Permutations
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=3648
Yevgeniy Dodis Aleksandr Yampolskiy Moti Yung
Tcc 2006
TCC 2006: Program
https://iacr.org/workshops/tcc2006.dir/tcc06/program.html
TCC 2006 March 4-7 2006, Columbia University New York, NY USA Home Call for papers Accepted papers Program Rump session Venue Entertainment Restaurant list Travel Info Accommodation Registration Contact Final Program All talks...
Theory of Cryptography 2006
https://iacr.org/archive/tcc2006/tcc2006.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project TCC 2006: New York, NY, USA Shai Halevi and Tal Rabin (Eds.): Theory of Cryptography, Third Theory of Cryptography Conference,...
Hunting and Gathering – Verifiable Random Functions from Standard Assumptions with Short Proofs
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=29308
Lisa Kohl
Pkc 2019
A verifiable random function (VRF) is a pseudorandom function, where outputs can be publicly verified. That is, given an output value together with a proof, one can check that the function was indeed correctly evaluated on the...
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs
Eprint
https://eprint.iacr.org/2019/042
Lisa Kohl
A verifiable random function (VRF) is a pseudorandom function, where outputs can be publicly verified. That is, given an output value together with a proof, one can check that the function was indeed correctly evaluated on the...
received 16 Jan 2019
Aleksandr Yampolskiy
Author
https://iacr.org/cryptodb/data/author.php?authorkey=112
Yale University
TCC 2009 Accepted Submissions
https://iacr.org/workshops/tcc2009.dir/tcc09/accepted-papers.htm
TCC 2009 Accepted Papers On the (Im)Possibility of Key Dependent Encryption Iftach Haitner; Thomas Holenstein Hierarchical Identity Based Encryption with Polynomially Many Levels Craig Gentry; Shai Halevi Universally...
Verifiable Random Permutations
Eprint
https://eprint.iacr.org/2006/078
Yevgeniy Dodis Prashant Puniya
Pseudorandom Functions (PRFs), introduced by Goldreich, Goldwasser and Micali, allow one to efficiently simulate the computation of a function which is indistinguishable from a truly random function. A seemingly stronger...
received 27 Feb 2006
IACR CRYPTO 2009
https://iacr.org/archive/crypto2009/crypto2009.html
CRYPTO 2009: Shai Halevi (Eds.): Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 Proceedings. CRYPTO 2009 Santa Barbara, CA, USA, August 16-20,...
Asiacrypt 05 -
https://iacr.org/conferences/asiacrypt2005/www.cs.iitm.ernet.in/~ac05/session.html
List of Accepted Papers - Sessionwise Algebra and Number Theory Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log Pascal Paillier, Damien Vergnaud Do All Elliptic Curves of the Same Order Have the Same...
PKC 2003
https://iacr.org/archive/pkc2003/pkc2003.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project PKC 2003: PKC 2003: Miami, Florida, USA Yvo Desmedt (Ed.): Public Key Cryptography - PKC 2003, 6th International Workshop on...
Eurocrypt 2004
https://iacr.org/conferences/eurocrypt2004/accepted.html
Home Call for Papers Accepted Papers Program Proceedings Rump Session Venue Excursion Accommodation Travel Info Registration Sponsors Contact List of Accepted Papers On Generating the Initial Key in the Bounded Storage Model...
Author Index, TCC 2006
https://iacr.org/archive/tcc2006/author-index.html
Author Index, TCC 2006 Beerliova, Zuzana 306 Beimel, Amos 486 Bender, Adam 60 Canetti, Ran 381 Catalano, Dario 120 Damgård, Ivan 41 , 286 Datta, Anupam 361 Derek, Ante 361 Di Crescenzo, Giovanni 226 Dodis, Yevgeniy 120 , 184 ,...
TCC 2009
https://iacr.org/workshops/tcc2009.dir/tcc09/program.html
Sixth IACR Theory of Cryptography Conference TCC 2009 March 15-17, 2009, Golden Gateway Hotel (Holiday Inn) San Francisco, CA, USA Program Saturday, March 14 18:00-21:00 Registration 19:00-21:00 Welcome reception, Crystal room...
Eurocrypt 2004 - Accepted papers
https://iacr.org/newsletter/v21n1/ec-accepted.html
Eurocrypt 2004 - Accepted papers See the Eurocrypt 2004 web site for more information. On Generating the Initial Key in the Bounded Storage Model Stefan Dziembowski and Ueli Maurer Finding Small Roots of Bivariate Integer...
Next ►