×

Found 60 Documents (Results 1–60)

Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. (English) Zbl 1319.94003

Lecture Notes in Computer Science 9216. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). xviii, 783 p. (2015).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. (English) Zbl 1319.94002

Lecture Notes in Computer Science 9215. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). xviii, 787 p. (2015).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. (English) Zbl 1292.94002

Lecture Notes in Computer Science 8616. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). xviii, 574 p. (2014).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. (English) Zbl 1292.94001

Lecture Notes in Computer Science 8617. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). xviii, 532 p. (2014).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Generalizing homomorphic MACs for arithmetic circuits. (English) Zbl 1335.94036

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 538-555 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. (English) Zbl 1317.94080

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 65-84 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Fully homomorphic message authenticators. (English) Zbl 1326.94126

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 301-320 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Hard-core predicates for a Diffie-Hellman problem over finite fields. (English) Zbl 1316.94071

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 148-165 (2013).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Quadratic span programs and succinct NIZKs without PCPs. (English) Zbl 1300.94056

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 626-645 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Algebraic (Trapdoor) one-way functions and their applications. (English) Zbl 1315.94065

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 680-699 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The generalized randomized iterate and its application to new efficient constructions of uowhfs from regular one-way functions. (English) Zbl 1292.94019

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 154-171 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computational extractors and pseudorandomness. (English) Zbl 1304.68136

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 383-403 (2012).
PDFBibTeX XMLCite
Full Text: DOI

Verifiable delegation of computation over large datasets. (English) Zbl 1288.68159

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 111-131 (2011).
MSC:  68Q60 94A60
PDFBibTeX XMLCite
Full Text: DOI

Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. (English) Zbl 1208.94009

Lecture Notes in Computer Science 6571. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). xiii, 495 p. (2011).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Constructing certificateless encryption and ID-based encryption from ID-based key agreement. (English) Zbl 1252.94062

Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 167-186 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive verifiable computing: outsourcing computation to untrusted workers. (English) Zbl 1284.68065

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 465-482 (2010).
MSC:  68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

Okamoto-Tanaka revisited: fully authenticated Diffie-Hellman with minimal overhead. (English) Zbl 1350.94034

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 309-328 (2010).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Text search protocols with simulation based security. (English) Zbl 1281.94025

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 332-350 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure network coding over the integers. (English) Zbl 1279.94075

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 142-160 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Making the Diffie-Hellman protocol identity-based. (English) Zbl 1272.94030

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 165-178 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

More on key wrapping. (English) Zbl 1267.94061

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 53-70 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. (English) Zbl 1137.94301

Lecture Notes in Computer Science 5037. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). xi, 508 p. (2008).
PDFBibTeX XMLCite
Full Text: DOI

Threshold RSA for dynamic and ad-hoc groups. (English) Zbl 1149.94316

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 88-107 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Off-line/On-line signatures: Theoretical aspects and experimental results. (English) Zbl 1162.94344

Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 101-120 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved on-line/off-line threshold signatures. (English) Zbl 1127.94021

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 217-232 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Independent zero-knowledge sets. (English) Zbl 1133.94344

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 34-45 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. (English) Zbl 1137.94336

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 128-146 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring. (English) Zbl 1081.94547

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 313-327 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. (English) Zbl 1197.94187

Naor, Moni (ed.), Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19–21, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21000-8/pbk). Lecture Notes in Computer Science 2951, 258-277 (2004).
MSC:  94A60 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure hashed Diffie-Hellman over non-DDH groups. (English) Zbl 1122.94418

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 361-381 (2004).
MSC:  94A62 20F99
PDFBibTeX XMLCite
Full Text: DOI

Randomness extraction and key derivation using the CBC, cascade and HMAC modes. (English) Zbl 1104.68470

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 494-510 (2004).
PDFBibTeX XMLCite
Full Text: DOI

Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks. (English) Zbl 1104.94050

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 220-236 (2004).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Batching Schnorr identification scheme with applications to privacy-preserving authorization and low-bandwidth communication devices. (English) Zbl 1094.94527

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 276-292 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Lower bounds on the efficiency of encryption and digital signature schemes. (English) Zbl 1192.94095

Proceedings of the thirty-fifth annual ACM symposium on theory of computing (STOC 2003), San Diego, CA, USA,. New York, NY: ACM Press (ISBN 1-58113-674-9). 417-425, electronic only (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A framework for password-based authenticated key exchange. (English) Zbl 1038.94534

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 524-543 (2003).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: Link

Provably secure threshold password authenticated key exchange. (English) Zbl 1038.94527

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 507-523 (2003).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

Secure applications of Pedersen’s distributed key generation protocol. (English) Zbl 1039.94516

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 373-390 (2003).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

Cryptanalysis of a pseudorandom generator based on braid groups. (English) Zbl 1055.94014

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 1-13 (2002).
MSC:  94A60 20F36
PDFBibTeX XMLCite
Full Text: Link

On 2-round secure multiparty computation. (English) Zbl 1026.94527

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 178-193 (2002).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: Link

The round complexity of verifiable secret sharing and secure multicast. (English) Zbl 1317.68072

Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6–8, 2001. New York, NY: ACM Press (ISBN 1-581-13349-9). 580-589 (2001).
MSC:  68Q25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Pseudo-random number generation on the IBM 4758 secure crypto coprocessor. (English) Zbl 1006.68711

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 93-102 (2001).
PDFBibTeX XMLCite
Full Text: Link

The bit security of Paillier’s encryption scheme and its applications. (English) Zbl 0981.94016

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 229-243 (2001).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

Computing inverses over a shared secret modulus. (English) Zbl 1082.94538

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 190-206 (2000).
MSC:  94A62
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software