×

Found 72 Documents (Results 1–72)

Concurrent secure computation with optimal query complexity. (English) Zbl 1351.94032

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 43-62 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A simpler variant of universally composable security for standard multiparty computation. (English) Zbl 1351.94031

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 3-22 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Succinct garbling and indistinguishability obfuscation for RAM programs. (English) Zbl 1321.94050

Proceedings of the 47th annual ACM symposium on theory of computing, STOC ’15, Portland, OR, USA, June 14–17, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3536-2). 429-437 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure two-party computation from indistinguishability obfuscation. (English) Zbl 1382.94077

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 557-585 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Obfuscation of probabilistic circuits and applications. (English) Zbl 1382.94078

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 468-497 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

On obfuscation with random oracles. (English) Zbl 1355.94049

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 456-467 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the existence of extractable one-way functions. (English) Zbl 1315.94059

Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 505-514 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Secure key exchange and sessions without credentials. (English) Zbl 1296.94095

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 40-56 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Client-server concurrent zero knowledge with constant rounds and guaranteed complexity. (English) Zbl 1296.94094

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 337-350 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On virtual grey box obfuscation for general circuits. (English) Zbl 1296.94089

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 108-125 (2014).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

The impossibility of obfuscation with auxiliary input or a universal simulator. (English) Zbl 1296.94087

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 71-89 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Verifiable set operations over outsourced databases. (English) Zbl 1296.94097

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 113-130 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Obfuscation for evasive functions. (English) Zbl 1296.94077

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 26-51 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. (English) Zbl 1270.94007

Lecture Notes in Computer Science 8042. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). xvii, 590 p. (2013).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. (English) Zbl 1270.94006

Lecture Notes in Computer Science 8043. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). xvii, 556 p. (2013).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Public-coin concurrent zero-knowledge in the global hash model. (English) Zbl 1296.94096

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 80-99 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Two protocols for delegation of computation. (English) Zbl 1295.94030

Smith, Adam (ed.), Information theoretic security. 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15–17, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32283-9/pbk). Lecture Notes in Computer Science 7412, 37-61 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Universally composable security with local adversaries. (English) Zbl 1296.94098

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 281-301 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. (English) Zbl 1246.94010

Lecture Notes in Computer Science 7417. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). xv, 888 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Efficient password authenticated key exchange via oblivious transfer. (English) Zbl 1296.94148

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 449-466 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Leakage-tolerant interactive protocols. (English) Zbl 1296.94088

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 266-284 (2012).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Towards a game theoretic view of secure computation. (English) Zbl 1290.94143

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 426-445 (2011).
MSC:  94A62 68M12 91A80
PDFBibTeX XMLCite
Full Text: DOI

On strong simulation and composable point obfuscation. (English) Zbl 1283.94052

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 520-537 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Obfuscation of hyperplane membership. (English) Zbl 1274.94047

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 72-89 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On symmetric encryption and point obfuscation. (English) Zbl 1274.94048

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 52-71 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards a theory of extractable functions. (English) Zbl 1213.94089

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 595-613 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-malleable obfuscation. (English) Zbl 1213.68203

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 73-90 (2009).
MSC:  68N30 94A60
PDFBibTeX XMLCite
Full Text: DOI

Modeling computational security in long-lived systems. (English) Zbl 1160.94382

van Breugel, Franck (ed.) et al., CONCUR 2008 – concurrency theory. 19th international conference, CONCUR 2008, Toronto, Canada, August 19–22, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85360-2/pbk). Lecture Notes in Computer Science 5201, 114-130 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

How to protect yourself without perfect shredding. (English) Zbl 1155.68383

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 511-523 (2008).
MSC:  68P25 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

Extractable perfectly one-way functions. (English) Zbl 1155.94364

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 449-460 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Obfuscating point functions with multibit output. (English) Zbl 1149.94306

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 489-508 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. (English) Zbl 1130.94001

Lecture Notes in Computer Science 4948. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). xii, 645 p. (2008).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Amplifying collision resistance: a complexity-theoretic treatment. (English) Zbl 1215.94036

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 264-283 (2007).
MSC:  94A60 68P05 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Obtaining universally compoable security: Towards the bare bones of trust. (English) Zbl 1153.94358

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 88-112 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Universally composable security with global setup. (English) Zbl 1129.94014

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 61-85 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Mitigating dictionary attacks on password-protected local storage. (English) Zbl 1161.94436

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 160-179 (2006).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Universally composable symbolic analysis of mutual authentication and key-exchange protocols. (English) Zbl 1112.94025

Halevi, Shai (ed.) et al., Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Berlin: Springer (ISBN 3-540-32731-2/pbk). Lecture Notes in Computer Science 3876, 380-403 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Universally composable password-based key exchange. (English) Zbl 1137.94367

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 404-421 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure computation without authentication. (English) Zbl 1145.94457

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 361-377 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Adaptively-secure, non-interactive public-key encryption. (English) Zbl 1079.94537

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 150-168 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hardness amplification of weakly verifiable puzzles. (English) Zbl 1079.94538

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 17-33 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the random-oracle methodology as applied to length-restricted signature schemes. (English) Zbl 1197.94215

Naor, Moni (ed.), Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19–21, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21000-8/pbk). Lecture Notes in Computer Science 2951, 40-57 (2004).
MSC:  94A62 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen-ciphertext security from identity-based encryption. (English) Zbl 1122.94358

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 207-222 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Relaxing chosen-ciphertext security. (English) Zbl 1122.94359

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 565-582 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universal composition with joint state. (English) Zbl 1122.94360

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 265-281 (2003).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

A forward-secure public-key encryption scheme. (English) Zbl 1037.68532

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 255-271 (2003).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

On the limitations of universally composable two-party computation without set-up assumptions. (English) Zbl 1038.94523

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 68-86 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Environmental requirements for authentication protocols. (English) Zbl 1033.94553

Okada, Mitsuhiro (ed.) et al., Software security – theories and systems. Mext-NSF-JSPS international symposium, ISSS 2002, Tokyo, Japan, November 8–10, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00708-3/pbk). Lect. Notes Comput. Sci. 2609, 339-355 (2003).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: Link

Universally composable two-party and multi-party secure computation. (English) Zbl 1192.94112

Proceedings of the thirty-fourth annual ACM symposium on theory of computing (STOC 2002), Montreal, Quebec, Canada, May 19–21, 2002. New York, NY: ACM Press (ISBN 1-581-13495-9). 494-503, electronic only (2002).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Universally composable notions of key exchange and secure channels. Extended Abstract. (English) Zbl 1056.94511

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 337-351 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Security analysis of IKE’s signature-based key-exchange protocol. (English) Zbl 1026.94524

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 143-161 (2002).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

Selective private function evaluation with applications to private statistics. (English) Zbl 1333.94052

Proceedings of the 20th annual ACM symposium on principles of distributed computing, PODC ’01, Newport, RI, USA, August 26–28, 2001. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-383-9). 293-304 (2001).
PDFBibTeX XMLCite
Full Text: DOI

Black-box concurrent zero-knowledge requires \(\tilde{\omega}(\log n)\) rounds. (English) Zbl 1317.68064

Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6–8, 2001. New York, NY: ACM Press (ISBN 1-581-13349-9). 570-579 (2001).
MSC:  68Q25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of key-exchange protocols and their use for building secure channels. (English) Zbl 0981.94032

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 453-474 (2001).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

On adaptive vs. non-adaptive security of multiparty protocols. (English) Zbl 0981.94040

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 262-279 (2001).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

Resettable zero-knowledge (extended abstract). (English) Zbl 1296.94093

Proceedings of the thirty-second annual ACM symposium on theory of computing (STOC 2000), Portland, Oregon, USA, May 21–23, 2000. New York, NY: ACM Press (ISBN 1-58113-184-4). 235-244 (2000).
MSC:  94A60 68Q15 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Exposure-resilient functions and all-or-nothing transforms. (English) Zbl 1082.94508

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 453-469 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software