×

Found 86 Documents (Results 1–86)

Autocorrelation values of new generalized cyclotomic sequences of order six over \(\mathbb Z_{pq}\). (English) Zbl 1347.94016

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 86-98 (2014).
MSC:  94A55 11T22
PDFBibTeX XMLCite
Full Text: DOI

ARBRA: anonymous reputation-based revocation with efficient authentication. (English) Zbl 1336.94081

Chow, Sherman S. M. (ed.) et al., Information security. 17th international conference, ISC 2014, Hong Kong, China, October 12–14, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-13256-3/pbk). Lecture Notes in Computer Science 8783, 33-53 (2014).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Near collision attack on the Grain v1 stream cipher. (English) Zbl 1321.94097

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 518-538 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear cryptanalysis of FASER128/256 and TriviA-ck. (English) Zbl 1337.94081

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 237-254 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ExBLACR: extending BLACR system. (English) Zbl 1337.94102

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 397-412 (2014).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract). (English) Zbl 1310.94174

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 165-182 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of helix and phelix revisited. (English) Zbl 1316.94087

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 27-40 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved key recovery attacks on reduced-round Salsa20 and ChaCha. (English) Zbl 1342.94096

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 337-351 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. (English) Zbl 1312.94039

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 50-67 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

(Pseudo) preimage attack on round-reduced Grøstl hash function and others. (English) Zbl 1312.94101

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 127-145 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3. (English) Zbl 1292.94139

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 160-178 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Benchmarking for steganography by kernel Fisher discriminant criterion. (English) Zbl 1292.94079

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 113-130 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully secure doubly-spatial encryption under simple assumptions. (English) Zbl 1303.94073

Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 253-263 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Combined public-key schemes: the case of ABE and ABS. (English) Zbl 1303.94072

Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 53-69 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An efficient leakage characterization method for profiled power analysis attacks. (English) Zbl 1369.94572

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 61-73 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. (English) Zbl 1319.94087

Bao, Feng (ed.) et al., Applied cryptography and network security. 10th international conference, ACNS 2012, Singapore, June 26–29, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31283-0/pbk). Lecture Notes in Computer Science 7341, 117-134 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Resettable cryptography in constant rounds – the case of zero knowledge. (English) Zbl 1227.94041

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 390-406 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. (English) Zbl 1298.94083

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 84-101 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hyper-Sbox view of AES-like permutations: a generalized distinguisher. (English) Zbl 1295.94158

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 155-168 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Loiss: a byte-oriented stream cipher. (English) Zbl 1272.94029

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). Lecture Notes in Computer Science 6639, 109-125 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to characterize side-channel leakages more accurately? (English) Zbl 1305.94061

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 196-207 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A byte-based guess and determine attack on SOSEMANUK. (English) Zbl 1253.94046

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 146-157 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An enhanced password authenticated key agreement protocol for wireless mobile network. (English) Zbl 1281.94080

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 134-143 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the LANE hash function. (English) Zbl 1267.94103

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 126-140 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An improved fast correlation attack on stream ciphers. (English) Zbl 1256.94071

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 214-227 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concurrently non-malleable black-box zero knowledge in the bare public-key model. (English) Zbl 1248.94063

Frid, Anna (ed.) et al., Computer science – theory and applications. Fourth international computer science symposium in Russia, CSR 2009, Novosibirsk, Russia, August 18–23, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03350-6/pbk). Lecture Notes in Computer Science 5675, 80-91 (2009).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

A new client-to-client password-authenticated key agreement protocol. (English) Zbl 1248.94103

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Second international workshop, IWCC 2009, Zhangjiajie, China, June 1–5, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01813-8/pbk). Lecture Notes in Computer Science 5557, 63-76 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Security of truncated MACs. (English) Zbl 1237.94097

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 96-114 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the unprovable security of 2-key XCBC. (English) Zbl 1279.94123

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 230-238 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New results on impossible differential cryptanalysis of reduced AES. (English) Zbl 1182.94049

Nam, Kil-Hyun (ed.) et al., Information security and cryptology – ICISC 2007. 10th international conference, Seoul, Korea, November 29–30, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76787-9/pbk). Lecture Notes in Computer Science 4817, 239-250 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key differential-linear attacks on reduced AES-192. (English) Zbl 1153.94444

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 73-85 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-pass fast correlation attack on stream ciphers. (English) Zbl 1161.94433

Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 234-248 (2007).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Improved related-key impossible differential attacks on reduced-round AES-192. (English) Zbl 1161.94434

Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 15-27 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the expected value of the joint 2-adic complexity of periodic binary multisequences. (English) Zbl 1152.94388

Gong, Guang (ed.) et al., Sequences and their applications – SETA 2006. 4th international conference, Beijing, China, September 24–28, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-44523-4/pbk). Lecture Notes in Computer Science 4086, 199-208 (2006).
MSC:  94A55 68Q25 94A60
PDFBibTeX XMLCite
Full Text: DOI

New guess-and-determine attack on the self-shrinking generator. (English) Zbl 1172.94605

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 54-68 (2006).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Symmetric nonce respecting security model and the MEM mode of operation. (English) Zbl 1175.94099

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 280-286 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Weaknesses of COSvd (2,128) stream cipher. (English) Zbl 1185.94072

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 270-283 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Integral cryptanalysis of reduced FOX block cipher. (English) Zbl 1185.94068

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 229-241 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Certificateless public-key signature: Security model and efficient construction. (English) Zbl 1151.94638

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34703-8/pbk). Lecture Notes in Computer Science 3989, 293-308 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the hash functions MD4 and RIPEMD. (English) Zbl 1137.94358

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 1-18 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Short threshold signature schemes without random oracles. (English) Zbl 1153.94465

Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 297-310 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the 2-adic complexity and the \(k\)-error 2-adic complexity of periodic binary sequences. (English) Zbl 1145.94418

Helleseth, T. (ed.) et al., Sequences and their applications – SETA 2004. Third international conference, Seoul, Korea, October 24–28, 2004. Revised selected papers. Berlin: Springer (ISBN 978-3-540-26084-4/pbk). Lecture Notes in Computer Science 3486, 185-196 (2005).
MSC:  94A55 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient identity-based protocol for fair certified e-mail delivery. (English) Zbl 1154.68413

Desmedt, Yvo G. (ed.) et al., Cryptology and network security. 4th international conference, CANS 2005, Xiamen, China, December 14–16, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30849-0/pbk). Lecture Notes in Computer Science 3810, 200-210 (2005).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

ID-based aggregate signatures from bilinear pairings. (English) Zbl 1154.94477

Desmedt, Yvo G. (ed.) et al., Cryptology and network security. 4th international conference, CANS 2005, Xiamen, China, December 14–16, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30849-0/pbk). Lecture Notes in Computer Science 3810, 110-119 (2005).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Efficient ID-based optimistic fair exchange with provable security. (English) Zbl 1122.94441

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 14-26 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Collision attack and pseudorandomness of reduced-round Camellia. (English) Zbl 1117.94339

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 252-266 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. First SKLOIS conference, CISC 2005, Beijing, China, December 15–17, 2005. Proceedings. (English) Zbl 1099.94001

Lecture Notes in Computer Science 3822. Berlin: Springer (ISBN 3-540-30855-5/pbk). xii, 420 p. (2005).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

A fast correlation attack on the shrinking generator. (English) Zbl 1079.94579

Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 72-86 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An arbitrated quantum message signature scheme. (English) Zbl 1117.94326

Zhang, Jun (ed.) et al., Computational and information science. First international symposium, CIS 2004, Shanghai, China, December 16–18, 2004. Proceedings. Berlin: Springer (ISBN 3-540-24127-2/pbk). Lecture Notes in Computer Science 3314, 1054-1060 (2004).
MSC:  94A60 68P25 81P68
PDFBibTeX XMLCite
Full Text: DOI

Chosen ciphertext attack on a new class of self-synchronizing stream ciphers. (English) Zbl 1113.94322

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 73-83 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential-linear cryptanalysis of Camellia. (English) Zbl 1081.94542

Chen, Kefei (ed.), Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). The Kluwer International Series in Engineering and Computer Science 769, 173-180 (2004).
MSC:  94A60
PDFBibTeX XMLCite

Analysis on the two classes of robust threshold key escrow schemes. (English) Zbl 1083.94513

Chen, Kefei (ed.), Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). The Kluwer International Series in Engineering and Computer Science 769, 137-144 (2004).
MSC:  94A60 11A07
PDFBibTeX XMLCite

A group of threshold group-signature schemes with privilege subsets. (English) Zbl 1083.94531

Chen, Kefei (ed.), Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). The Kluwer International Series in Engineering and Computer Science 769, 81-88 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite

Security analysis of the generalized self-shrinking generator. (English) Zbl 1109.94354

Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 388-400 (2004).
MSC:  94A60 94A62 94A55
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of a knapsack based two-lock cryptosystem. (English) Zbl 1103.68546

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 303-309 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Making the key agreement protocol in mobile ad hoc network more efficient. (English) Zbl 1131.68456

Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 343-356 (2003).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software