×

Found 72 Documents (Results 1–72)

Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. (English) Zbl 1375.94105

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 563-594 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hosting services on an untrusted cloud. (English) Zbl 1371.94626

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 404-436 (2015).
MSC:  94A60 68P25 68M11
PDFBibTeX XMLCite
Full Text: DOI

Bivariate polynomials modulo composites and their applications. (English) Zbl 1306.94032

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 42-62 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. (English) Zbl 1310.94130

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 480-499 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Low overhead broadcast encryption from multilinear maps. (English) Zbl 1317.94087

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 206-223 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. (English) Zbl 1327.94035

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 533-556 (2014).
MSC:  94A60 94C05
PDFBibTeX XMLCite
Full Text: DOI

Private database queries using somewhat homomorphic encryption. (English) Zbl 1330.94037

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 102-118 (2013).
MSC:  94A60 68P15
PDFBibTeX XMLCite
Full Text: DOI

Function-private subspace-membership encryption and its applications. (English) Zbl 1327.94036

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 255-275 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constrained pseudorandom functions and their applications. (English) Zbl 1314.94057

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 280-300 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Function-private identity-based encryption: hiding the function in functional encryption. (English) Zbl 1311.94071

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 461-478 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure signatures and chosen ciphertext security in a quantum computing world. (English) Zbl 1317.81074

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 361-379 (2013).
MSC:  81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Key homomorphic PRFs and their applications. (English) Zbl 1310.94129

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 410-428 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Message-locked encryption for lock-dependent messages. (English) Zbl 1310.94120

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 374-391 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Quantum-secure message authentication codes. (English) Zbl 1312.94111

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 592-608 (2013).
MSC:  94A62 81P68
PDFBibTeX XMLCite
Full Text: DOI

Targeted malleability: homomorphic encryption for restricted computations. (English) Zbl 1347.68119

Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS’12, Cambridge, MA, USA, January 8–10, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1115-1). 350-366 (2012).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Pairing-based cryptography: past, present, and future. (English) Zbl 1292.94034

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 1 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computing on authenticated data. (English) Zbl 1292.94017

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 1-20 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Random oracles in a quantum world. (English) Zbl 1227.94033

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 41-69 (2011).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI arXiv

Homomorphic signatures for polynomial functions. (English) Zbl 1281.94072

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 149-168 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Functional encryption: definitions and challenges. (English) Zbl 1295.94027

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 253-273 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. (English) Zbl 1291.94181

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 1-16 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. (English) Zbl 1280.94035

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 98-115 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient lattice (H)IBE in the standard model. (English) Zbl 1227.94022

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 553-572 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preventing pollution attacks in multi-source network coding. (English) Zbl 1279.94050

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 161-176 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Signing a linear subspace: Signature schemes for network coding. (English) Zbl 1227.68024

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 68-87 (2009).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Generalized identity based and broadcast encryption schemes. (English) Zbl 1206.94054

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 455-470 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Circular-secure encryption from decision Diffie-Hellman. (English) Zbl 1183.94025

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 108-125 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public key encryption that allows PIR queries. (English) Zbl 1215.68096

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 50-67 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Bilinear groups of composite order. (English) Zbl 1151.94484

Takagi, Tsuyoshi (ed.) et al., Pairing-based cryptography – Pairing 2007. First international conference, Tokyo, Japan, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73488-8/pbk). Lecture Notes in Computer Science 4575, 1 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Conjunctive, subset, and range queries on encrypted data. (English) Zbl 1156.94335

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 535-554 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Privacy in encrypted content distribution using private broadcast encryption. (English) Zbl 1152.94402

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 52-64 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Fully collusion resistant traitor tracing with short ciphertexts and private keys. (English) Zbl 1140.94326

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 573-592 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of efficiently combining collision resistant hash functions. (English) Zbl 1138.94347

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 570-583 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly unforgeable signatures based on computational Diffie-Hellman. (English) Zbl 1151.94485

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 229-240 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Chosen ciphertext secure public key threshold encryption without random oracles. (English) Zbl 1125.94012

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 226-243 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hierarchical identity based encryption with constant size ciphertext. (English) Zbl 1137.94340

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 440-456 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collusion resistant broadcast encryption with short ciphertexts and private keys. (English) Zbl 1145.94434

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 258-275 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. (English) Zbl 1079.94535

Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 87-103 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public key encryption with keyword search. (English) Zbl 1122.68424

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 506-522 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient selective-id secure identity-based encryption without random oracles. (English) Zbl 1122.94355

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 223-238 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Short signatures without random oracles. (English) Zbl 1122.94354

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 56-73 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Short group signatures. (English) Zbl 1104.94044

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 41-55 (2004).
MSC:  94A62 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

Secure identity based encryption without random oracles. (English) Zbl 1104.94019

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 443-459 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Oblivious signature-based envelope. (English) Zbl 1321.94075

Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC ’03, Boston, MA, USA, July 13–16, 2003. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-708-7). 182-189 (2003).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The design and implementation of protocol-based hidden key recovery. (English) Zbl 1255.94055

Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 165-179 (2003).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. (English) Zbl 1027.00041

Lecture Notes in Computer Science. 2729. Berlin: Springer. xii, 631 p. (2003).
PDFBibTeX XMLCite
Full Text: DOI Link

Aggregate and verifiably encrypted signatures from bilinear maps. (English) Zbl 1038.94553

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 416-432 (2003).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Applications of multilinear forms to cryptography. (English) Zbl 1030.94032

Melles, Caroline Grant (ed.) et al., Topics in algebraic and noncommutative geometry. Proceedings in memory of Ruth Michler, Luminy, France, July 20-22, 2001 and Annapolis, MD, USA, October 25-28, 2001. Providence, RI: American Mathematical Society (AMS). Contemp. Math. 324, 71-90 (2003).
MSC:  94A60 14G50
PDFBibTeX XMLCite

A secure signature scheme from bilinear maps. (English) Zbl 1039.94522

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 98-110 (2003).
MSC:  94A62 68Q25
PDFBibTeX XMLCite
Full Text: Link

Optimistic mixing for exit-polls. (English) Zbl 1065.94548

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 451-465 (2002).
MSC:  94A60 91B10 68P25
PDFBibTeX XMLCite
Full Text: DOI

Short signatures from the Weil pairing. (English) Zbl 1064.94554

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 514-532 (2001).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: Link

The modular inversion hidden number problem. (English) Zbl 1062.94545

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 36-51 (2001).
MSC:  94A60 11T71 68Q25
PDFBibTeX XMLCite
Full Text: Link

On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme. (English) Zbl 1002.94025

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 201-212 (2001).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

Lower bounds for multicast message authentication. (English) Zbl 0981.94037

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 437-452 (2001).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Why textbook ElGamal and RSA encryption are insecure. (Extended abstract). (English) Zbl 0980.94014

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 30-43 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software