×

Found 58 Documents (Results 1–58)

Improved side-channel analysis of finite-field multiplication. (English) Zbl 1380.94073

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 395-415 (2015).
MSC:  94A60 68M07
Full Text: DOI

New multilinear maps over the integers. (English) Zbl 1375.94116

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 267-286 (2015).
MSC:  94A60
Full Text: DOI

Zeroizing without low-level zeroes: new MMAP attacks and their limitations. (English) Zbl 1375.94114

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 247-266 (2015).
MSC:  94A60

Conversion from arithmetic to Boolean masking with logarithmic complexity. (English) Zbl 1367.94305

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 130-149 (2015).
MSC:  94A60

Higher-order side channel security and mask refreshing. (English) Zbl 1321.94052

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 410-424 (2014).
MSC:  94A60
Full Text: DOI

Secure conversion between Boolean and arithmetic masking of any order. (English) Zbl 1375.94115

Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 188-205 (2014).
MSC:  94A60 68P25
Full Text: DOI

Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. (English) Zbl 1375.94117

Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 170-187 (2014).
MSC:  94A60 11T06
Full Text: DOI

Higher order masking of look-up tables. (English) Zbl 1326.94082

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 441-458 (2014).
MSC:  94A60
Full Text: DOI

Scale-invariant fully homomorphic encryption over the integers. (English) Zbl 1335.94041

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 311-328 (2014).
MSC:  94A60
Full Text: DOI

Rounding and chaining LLL: finding faster small roots of univariate polynomial congruences. (English) Zbl 1335.11102

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 185-202 (2014).
MSC:  11Y16 68W30 94A60
Full Text: DOI

Batch fully homomorphic encryption over the integers. (English) Zbl 1306.94040

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 315-335 (2013).
MSC:  94A60
Full Text: DOI

Conversion of security proofs from one leakage model to another: a new issue. (English) Zbl 1352.94032

Schindler, Werner (ed.) et al., Constructive side-channel analysis and secure design. Third international workshop, COSADE 2012, Darmstadt, Germany, May 3–4, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29911-7/pbk). Lecture Notes in Computer Science 7275, 69-81 (2012).
MSC:  94A60

Public key compression and modulus switching for fully homomorphic encryption over the integers. (English) Zbl 1297.94062

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 446-464 (2012).
MSC:  94A60
Full Text: DOI

Supplemental access control (PACE v2): security analysis of PACE integrated mapping. (English) Zbl 1301.68117

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 207-232 (2012).
MSC:  68P25 94A60
Full Text: DOI

Fully homomorphic encryption over the integers with shorter public keys. (English) Zbl 1290.94059

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 487-504 (2011).
MSC:  94A60
Full Text: DOI

Improved generic algorithms for hard knapsacks. (English) Zbl 1281.94014

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 364-385 (2011).
MSC:  94A60 68Q25

Cryptanalysis of the RSA subgroup assumption from TCC 2005. (English) Zbl 1291.94070

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 147-155 (2011).
MSC:  94A60
Full Text: DOI

Efficient indifferentiable hashing into ordinary elliptic curves. (English) Zbl 1261.94025

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 237-254 (2010).
MSC:  94A60 14H52 11T71
Full Text: DOI

Analysis and improvement of the random delay countermeasure of CHES 2009. (English) Zbl 1297.94061

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 95-109 (2010).
MSC:  94A60 68P25
Full Text: DOI

On the broadcast and validity-checking security of pkcs#1 v1.5 encryption. (English) Zbl 1315.94054

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 1-18 (2010).
MSC:  94A60
Full Text: DOI

Secure delegation of elliptic-curve pairing. (English) Zbl 1391.94738

Gollmann, Dieter (ed.) et al., Smart card research and advanced application. 9th IFIP WG 8.8/11.2 international conference, CARDIS 2010, Passau, Germany, April 14–16, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12509-6/pbk). Lecture Notes in Computer Science 6035, 24-35 (2010).
MSC:  94A60 14G50
Full Text: DOI

PSS is secure against random fault attacks. (English) Zbl 1267.94116

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 653-666 (2009).
MSC:  94A60 68P25
Full Text: DOI

Fault attacks on RSA signatures with partially unknown messages. (English) Zbl 1290.94057

Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 444-456 (2009).
MSC:  94A60
Full Text: DOI

An efficient method for random delay generation in embedded software. (English) Zbl 1290.94058

Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 156-170 (2009).
MSC:  94A60 68P25
Full Text: DOI

Practical cryptanalysis of ISO/IEC 9796-2 and EMV signatures. (English) Zbl 1252.94055

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 428-444 (2009).
MSC:  94A60 94A62
Full Text: DOI

The random oracle model and the ideal cipher model are equivalent. (English) Zbl 1183.94026

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 1-20 (2008).
MSC:  94A60
Full Text: DOI

Finding small roots of bivariate integer polynomial equations: a direct approach. (English) Zbl 1215.11120

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 379-394 (2007).
MSC:  11Y16 68Q25 94A60
Full Text: DOI

Side channel cryptanalysis of a higher order masking scheme. (English) Zbl 1300.94048

Paillier, Pascal (ed.) et al., Cryptographic hardware and embedded systems – CHES 2007. 9th international workshop, Vienna, Austria, September 10–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74734-5/pbk). Lecture Notes in Computer Science 4727, 28-44 (2007).
MSC:  94A60
Full Text: DOI

Merkle-Damgård revisited: How to construct a hash function. (English) Zbl 1145.94436

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 430-448 (2005).
MSC:  94A60 68P25
Full Text: DOI

From fixed-length to arbitrary-length RSA encoding schemes revisited. (English) Zbl 1081.94018

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 234-243 (2005).
MSC:  94A60
Full Text: DOI

Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem. (English) Zbl 1198.94088

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 14-27 (2004).
MSC:  94A60 94B05
Full Text: DOI

Cryptanalysis of a zero-knowledge identification protocol of Eurocrypt ‘95. (English) Zbl 1196.94047

Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 157-162 (2004).
MSC:  94A60 94A62
Full Text: DOI

Finding small roots of bivariate integer polynomial equations revisited. (English) Zbl 1122.13302

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 492-505 (2004).
MSC:  13P05 14G50 65H05 68Q05 68Q25 94A60
Full Text: DOI

Boneh et al.’s \(k\)-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption. (English) Zbl 1205.94080

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 392-397 (2003).
MSC:  94A60 94A62
Full Text: DOI

Optimal security proofs for PSS and other signature schemes. (English) Zbl 1055.94025

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 272-287 (2002).
MSC:  94A62 94A60

Optimal chosen-ciphertext secure encryption of arbitrary-length messages. (English) Zbl 1056.68542

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 17-33 (2002).
MSC:  68P25 94A60 68Q25

GEM: a Generic chosen-ciphertext secure Ecryption Method. (English) Zbl 1048.94504

Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 263-276 (2002).
MSC:  94A60 68P25

Fast generation of pairs \((k,[k]P)\) – for Koblitz elliptic curves. (English) Zbl 1067.94525

Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 151-164 (2001).
MSC:  94A60 94A62 14G50

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software