166 results on '"Hovav Shacham"'
Search Results
52. Sequential Aggregate Signatures and Multisignatures Without Random Oracles.
53. On the effectiveness of address-space randomization.
54. Group signatures with verifier-local revocation.
55. Sequential Aggregate Signatures from Trapdoor Permutations.
56. Short Group Signatures.
57. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
58. Too LeJIT to Quit: Extending JIT Spraying to ARM.
59. Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.
60. Compact Proofs of Retrievability.
61. Short Signatures from the Weil Pairing.
62. Improving SSL Handshake Performance via Batching.
63. Return-Oriented Programming: Systems, Languages, and Applications.
64. Mouse Trap: Exploiting Firmware Updates in USB Peripherals.
65. Short Signatures from the Weil Pairing.
66. Client-side caching for TLS.
67. The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
68. Comprehensive Experimental Analyses of Automotive Attack Surfaces.
69. OpenScan: A Fully Transparent Optical Scan Voting System.
70. Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer.
71. Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
72. You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems.
73. SiRiUS: Securing Remote Untrusted Storage.
74. Fast-Track Session Establishment for TLS.
75. Don't Take LaTeX Files from Strangers.
76. New Trapdoor Projection Maps for Composite-Order Bilinear Groups.
77. Hedged Public-key Encryption: How to Protect against Bad Randomness.
78. The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.
79. Careful with Composition: Limitations of Indifferentiability and Universal Composability.
80. Delegatable Anonymous Credentials.
81. Reconstructing RSA Private Keys from Random Key Bits.
82. The BBG HIBE Has Limited Delegation.
83. A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants.
84. Efficient Ring Signatures without Random Oracles.
85. Advances in Cryptology – CRYPTO 2018 : 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I
86. HIPStR
87. Sequential Aggregate Signatures from Trapdoor Permutations.
88. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
89. Advances in Cryptology – CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part III
90. A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations
91. Advances in Cryptology – CRYPTO 2017
92. Iago attacks
93. Too LeJIT to Quit: Extending JIT Spraying to ARM
94. Risk-limiting Audits and the Margin of Victory in Nonplurality Elections
95. Risk-limiting Audits for Nonplurality Elections
96. Pairing-Based Cryptography – Pairing 2009
97. Randomizable Proofs and Delegatable Anonymous Credentials
98. Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II
99. Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II
100. 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '11, San Francisco, CA, USA, August 8-9, 2011
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.