International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 11000 results
Secure Vickrey Auctions without Threshold Trust
Eprint
https://eprint.iacr.org/2001/095
Helger Lipmaa N. Asokan Valtteri Niemi
We argue that threshold trust is not an option in most of the real-life electronic auctions. We then propose two new cryptographic Vickrey auction schemes that involve, apart from the bidders and the seller $S$, an auction...
last revised 3 May 2002
New Reports in the Cryptology ePrint Archive
https://iacr.org/newsletter/v19n1/eprint.html
New Reports in the Cryptology ePrint Archive 2002/030 ( PS PS.GZ ) Adaptive chi-square test and its application to some cryptographic problems. Boris Ryabko 2002/029 ( PS PS.GZ PDF ) Efficient Computation Modulo a Shared...
Valtteri Niemi
Author
https://iacr.org/cryptodb/data/author.php?authorkey=457
Nokia Research Center
On Diophantine Complexity and Statistical Zero-Knowledge Arguments
Eprint
https://eprint.iacr.org/2003/105
Helger Lipmaa
We show how to construct practical honest-verifier statistical zero-knowledge \emph{Diophantine} arguments of knowledge (HVSZK AoK) that a committed tuple of integers belongs to an arbitrary language in bounded arithmetic. ...
last revised 5 Sep 2003
New Reports in the Cryptology ePrint Archive
https://iacr.org/newsletter/v20n1/eprint.html
New Reports in the Cryptology ePrint Archive (The list contains reports posted since the last newsletter issue appeared.) 2003/034 ( PS PS.GZ PDF ) On the (In)security of the Fiat-Shamir Paradigm Shafi Goldwasser and Yael...
Interleaving Cryptography and Mechanism Design: The Case of Online Auctions
Eprint
https://eprint.iacr.org/2003/021
Edith Elkind Helger Lipmaa
We propose a new cryptographically protected multi-round auction mechanism for online auctions. This auction mechanism is designed to provide (in this order) security, cognitive convenience, and round-effectiveness. One can...
last revised 30 Dec 2003
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Eprint
https://eprint.iacr.org/2019/102
Hisham S. Galal Amr M. Youssef
The wide deployment of tokens for digital assets on top of Ethereum implies the need for powerful trading platforms. Vickrey auctions have been known to determine the real market price of items as bidders are motivated to...
received 31 Jan 2019
Man-in-the-Middle in Tunnelled Authentication Protocols
Eprint
https://eprint.iacr.org/2002/163
N. Asokan Valtteri Niemi Kaisa Nyberg
Recently new protocols have been proposed in IETF for protecting remote client authentication protocols by running them within a secure tunnel. Examples of such protocols are PIC, PEAP and EAP-TTLS. One goal of these new...
last revised 13 Nov 2002
Helger Lipmaa
Author
https://iacr.org/cryptodb/data/author.php?authorkey=487
University of Tartu, Estonia ; Simula UiB, Norway
Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles
Eprint
https://eprint.iacr.org/2015/1112
Prastudy Fauzi Helger Lipmaa
One way to guarantee security against malicious voting servers is to use NIZK shuffle arguments. Up to now, only two NIZK shuffle arguments in the CRS model have been proposed. Both arguments are relatively inefficient...
last revised 25 Nov 2015
EUROCRYPT '98 Contact Information
https://iacr.org/conferences/ec98/contact.html
EUROCRYPT '98 Contact Information Please direct your correspondence to the relevant person below, or send email to the general mailing address eurocrypt98@hut.fi . For up-to-date information, see also the conference WWW pages...
How to Prevent Buying of Votes in Computer Elections
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=319
Valtteri Niemi Ari Renvall
Asiacrypt 1994
A New Trapdoor in Knapsacks
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=2622
Valtteri Niemi
Eurocrypt 1990
TWOPRIME: A Fast Stream Ciphering Algorithm
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=2995
Cunsheng Ding Valtteri Niemi Ari Renvall Arto Salomaa
Fse 1997
PKC 2010 - Program
https://iacr.org/workshops/pkc2010/index.html
Program Call for papers Program Wednesday, May 26th, 2010 12:30 Registration 13:50 Opening 14:00 Encryption I (Session chair: Duong Hieu Phan) Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the...
presentation
https://iacr.org/conferences/asiacrypt2003/presentation.html
Presentation Files download: Download All Title Authors Download Opening Ceremony Chi Sung Laih Session 1 Chosen-Ciphertext Security without Redundancy Duong Hieu Phan, David Pointcheval Some RSA-based Encryption Schemes with...
N. Asokan
Author
https://iacr.org/cryptodb/data/author.php?authorkey=1753
New Reports in the Cryptology ePrint Archive
https://iacr.org/newsletter/v17n3/eprint.html
New Reports in the Cryptology ePrint Archive Note: The 1996-1999 contents of the Theory of Cryptology Library have been automatically included in the Cryptology ePrint Archive for the years prior to 2000. 2000/049 ( PS PS.GZ )...
A correction to ``Efficient and Secure Comparison for On-Line Auctions''
Eprint
https://eprint.iacr.org/2008/321
Ivan Damg{\aa}rd Martin Geisler Mikkel Kr{\o}igaard
In this note, we describe a correction to the cryptosystem proposed by the authors in "Efficient and Secure Comparison for On-Line Auctions". Although the correction is small and does not affect the performance of the...
received 25 Jul 2008
IACR PKC 2010
https://iacr.org/archive/pkc2010/pkc2010.html
PKC 2010: David Pointcheval and Phong Q. Nguyen (Eds.): Public Key Cryptography - PKC 2010 - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010...
Next ►