International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Key Management from a Security Viewpoint
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=893
G. R. Blakley
Crypto 1981
Crypto 81 Proceedings
https://iacr.org/archive/crypto81/index.html
Crypto 81 proceedings The proceedings of Crypto 81 was published as a UCSB Tech Report. These papers were not refereed, and this predates the existence of IACR. The front matter with preface and table of contents is available...
G. R. Blakley
Author
https://iacr.org/cryptodb/data/author.php?authorkey=1142
Accepted papers for Crypto '95
https://iacr.org/conferences/c95/c95list.html
Accepted papers for Crypto '95 The following is a list of papers that have been accepted for presentation at Crypto '95. A full program will appear later. Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt...
Threshold Schemes with Disenrollment
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=899
Bob Blakley G. R. Blakley Agnes Hui Chan James L. Massey
Crypto 1992
Security of Ramp Schemes
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=905
G. R. Blakley Catherine Meadows
Crypto 1984
Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
Eprint
https://eprint.iacr.org/2005/008
J. Wu R. Wei
In IEEE INFOCOM 2004, Chan proposed a distributed key management scheme for mobile ad hoc networks, and deduced the condition under which the key sets distributed to the network nodes can form a cover-free family (CFF), which...
last revised 5 May 2005
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
Eprint
https://eprint.iacr.org/2019/467
Clément Massart François-Xavier Standaert
Inspired by the literature on side-channel attacks against cryptographic implementations, we describe a framework for the analysis of location privacy. It allows us to revisit (continuous) re-identification attacks with a...
received 7 May 2019
Smallest Possible Message Expansion in Threshold Schemes
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=901
G. R. Blakley R. D. Dixon
Crypto 1986
Crypto '95 program
https://iacr.org/conferences/c95/c95sched.html
Crypto '95 Final Program Sponsored by the International Association for Cryptologic Research Social Program Registration, 4-8pm, Sunday, August 27, 1995 Evening events are as follows: Sunday, August 27, 7-10pm, Cocktail party...
Crypto '95 program
https://iacr.org/conferences/c95/c95prog.html
Crypto '95 Final Program Sponsored by the International Association for Cryptologic Research Social Program Registration, 4-8pm, Sunday, August 27, 1995 Evening events are as follows: Sunday, August 27, 7-10pm, Cocktail party...
On Tamper-Resistance from a Theoretical Viewpoint
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=18597
Paulo Mateus Serge Vaudenay
Ches 2009
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Eprint
https://eprint.iacr.org/2018/498
Qian Guo Vincent Grosso François-Xavier Standaert
One important open question in the field of side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security proofs. For concrete...
last revised 23 May 2018
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=24385
Stéphanie Kerckhof François Durvaux Cédric Hocquet David Bol François-Xavier Standaert
Ches 2012
Information Theory Without the Finiteness Assumption, II: Unfolding the DES
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=897
G. R. Blakley
Crypto 1985
General Perfect Secret Sharing Schemes
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=903
G. R. Blakley Gregory Kabatianskii
Crypto 1995
Fingerprinting Long Forgiving Messages
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=907
G. R. Blakley Catherine Meadows George B. Purdy
Crypto 1985
Cryptosystems Based on an Analog of Heat Flow
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=909
G. R. Blakley William Rundell
Crypto 1987
Infinite Structures in Information Theory
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=1786
G. R. Blakley Laif Swanson
Crypto 1982
Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=895
G. R. Blakley
Crypto 1984
Next ►