×

Found 63 Documents (Results 1–63)

Augmented learning with errors: the untapped potential of the error term. (English) Zbl 1415.94427

Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8975, 333-352 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Nearest planes in practice. (English) Zbl 1401.94139

Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 203-215 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Tuning GaussSieve for speed. (English) Zbl 1370.94512

Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 288-305 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Mutant differential fault analysis of Trivium MDFA. (English) Zbl 1344.94065

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, Korea, December 3–5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 433-446 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Discrete Ziggurat: a time-memory trade-off for sampling from a Gaussian distribution over the integers. (English) Zbl 1362.94024

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 402-417 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improvement and efficient implementation of a lattice-based signature scheme. (English) Zbl 1321.94107

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 48-67 (2014).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the efficiency of provably secure NTRU. (English) Zbl 1306.94036

Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 22-39 (2014).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Towards lattice based aggregate signatures. (English) Zbl 1318.94066

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 336-355 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Forward secure signatures on smart cards. (English) Zbl 1327.94084

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 66-80 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Fast verification for improved versions of the UOV and rainbow signature schemes. (English) Zbl 1306.94086

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 188-202 (2013).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of hash-based tamed transformation and minus signature scheme. (English) Zbl 1306.94080

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 155-164 (2013).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Optimizing guessing strategies for algebraic cryptanalysis with applications to EPCBC. (English) Zbl 1311.94100

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 175-197 (2013).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

Many weak keys for PRINTcipher: fast key recovery and countermeasures. (English) Zbl 1301.94110

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 189-206 (2013).
MSC:  94A60 90C11 90C05
PDFBibTeX XMLCite
Full Text: DOI

On the design of hardware building blocks for modern lattice-based encryption schemes. (English) Zbl 1294.94048

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 512-529 (2012).
MSC:  94A60 68P25 65T50
PDFBibTeX XMLCite
Full Text: DOI

Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. (English) Zbl 1241.94004

Lecture Notes in Computer Science 7293. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). xiv, 734 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48. (English) Zbl 1307.94044

Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 54-75 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

XMSS – a practical forward secure signature scheme based on minimal security assumptions. (English) Zbl 1298.94082

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 117-129 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the security of the Winternitz one-time signature scheme. (English) Zbl 1280.94106

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 363-378 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Linear recurring sequences for the UOV key generation. (English) Zbl 1291.94141

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 335-350 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Practical algebraic cryptanalysis for dragon-based cryptosystems. (English) Zbl 1294.94035

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 140-155 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cyclicrainbow – a multivariate signature scheme with a partially cyclic public key. (English) Zbl 1294.94069

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 33-48 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Towards provable security of the unbalanced oil and vinegar signature scheme under direct attacks. (English) Zbl 1294.94036

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 17-32 (2010).
MSC:  94A60 68Q17 94A62
PDFBibTeX XMLCite
Full Text: DOI

MXL\(_3\): an efficient algorithm for computing Gröbner bases of zero-dimensional ideals. (English) Zbl 1305.94066

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 87-100 (2010).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

Selecting parameters for the Rainbow signature scheme. (English) Zbl 1286.94084

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 218-240 (2010).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Flexible partial enlargement to accelerate Gröbner basis computation over \(\mathbb{F}_2\). (English) Zbl 1284.94058

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 69-81 (2010).
MSC:  94A60 13P10 68W30
PDFBibTeX XMLCite
Full Text: DOI

Parallel shortest lattice vector enumeration on graphics cards. (English) Zbl 1284.68638

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 52-68 (2010).
MSC:  68W10 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Secure parameters for SWIFFT. (English) Zbl 1273.94343

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 1-17 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic attack on the MQQ public key cryptosystem. (English) Zbl 1287.94087

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 392-401 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hash-based digital signature schemes. (English) Zbl 1161.81318

Bernstein, Daniel J. (ed.) et al., Post-quantum cryptography. First international workshop PQCrypto 2006, Leuven, The Netherland, May 23–26, 2006. Selected papers. Berlin: Springer (ISBN 978-3-540-88701-0/hbk; 978-3-540-88702-7/ebook). 35-93 (2009).
MSC:  81P68 94A60
PDFBibTeX XMLCite
Full Text: DOI

MXL2: Solving polynomial equations over \(\text{GF}(2)\) using an improved mutant strategy. (English) Zbl 1177.11094

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 203-215 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Explicit hard instances of the shortest vector problem. (English) Zbl 1177.94132

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 79-94 (2008).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Merkle tree traversal revisited. (English) Zbl 1177.94182

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 63-78 (2008).
MSC:  94A62 94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. (English) Zbl 1147.94002

Lecture Notes in Computer Science 5299. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). x, 231 p. (2008).
PDFBibTeX XMLCite
Full Text: DOI

Merkle signatures with virtually unlimited signature capacity. (English) Zbl 1214.94060

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 31-45 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A zero-dimensional Gröbner basis for AES-128. (English) Zbl 1234.94032

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 78-88 (2006).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

CMSS – an improved Merkle signature scheme. (English) Zbl 1175.94106

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 349-363 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Block ciphers sensitive to Gröbner basis attacks. (English) Zbl 1125.94013

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 313-331 (2006).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

A multipurpose delegation proxy for WWW credentials. (English) Zbl 1216.68104

Chadwick, David (ed.) et al., Public key infrastructure. Second European PKI workshop: research and application, EuroPKI 2005, Canterbury, UK, June 30 – July 1, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-28062-6/pbk). Lecture Notes in Computer Science 3545, 1-21 (2005).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Number field cryptography. (English) Zbl 1073.94012

van der Poorten, Alf (ed.) et al., High primes and misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams. Selected papers from the international conference on number theory, Banff, AB, Canada, May 24–30, 2003. Providence, RI: American Mathematical Society (AMS) (ISBN 0-8218-3353-7/hbk). Fields Institute Communications 41, 111-121 (2004).
PDFBibTeX XMLCite

A survey on IQ cryptography. (English) Zbl 0983.94034

Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 1-15 (2001).
MSC:  94A60 11R04 11R29
PDFBibTeX XMLCite

Efficient construction of cryptographically strong elliptic curves. (English) Zbl 0974.11043

Roy, Bimal (ed.) et al., Progress in cryptology - INDOCRYPT 2000. 1st international conference in cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1977, 191-202 (2000).
PDFBibTeX XMLCite

Discrete logarithms: Recent progress. (English) Zbl 1032.11061

Buchmann, Johannes (ed.) et al., Coding theory, cryptography and related areas. Proceedings of an international conference, Guanajuato, Mexico, April 1998. Berlin: Springer. 42-56 (2000).
MSC:  11Y16 94A60
PDFBibTeX XMLCite

Coding theory, cryptography and related areas. Proceedings of an international conference, Guanajuato, Mexico, April 1998. (English) Zbl 0930.00089

Berlin: Springer. viii, 259 p. (2000).
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software