×

Found 62 Documents (Results 1–62)

Private database access with HE-over-ORAM architecture. (English) Zbl 1459.68057

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 172-191 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Zeroizing without low-level zeroes: new MMAP attacks and their limitations. (English) Zbl 1375.94114

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 247-266 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Bootstrapping for HElib. (English) Zbl 1370.94516

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 641-670 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Graph-induced multilinear maps from lattices. (English) Zbl 1315.94076

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 498-527 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algorithms in HElib. (English) Zbl 1343.94061

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 554-571 (2014).
MSC:  94A60 68W99
PDFBibTeX XMLCite
Full Text: DOI

On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. (English) Zbl 1336.94048

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 518-535 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. (English) Zbl 1327.94035

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 533-556 (2014).
MSC:  94A60 94C05
PDFBibTeX XMLCite
Full Text: DOI

Garbled RAM revisited. (English) Zbl 1332.94067

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 405-422 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Two-round secure MPC from indistinguishability obfuscation. (English) Zbl 1317.94109

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 74-94 (2014).
MSC:  94A60 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Optimizing ORAM and using it efficiently for secure computation. (English) Zbl 1315.94075

De Cristofaro, Emiliano (ed.) et al., Privacy enhancing technologies. 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10–12, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39076-0/pbk). Lecture Notes in Computer Science 7981, 1-18 (2013).
MSC:  94A60 68P25
Full Text: DOI

Private database queries using somewhat homomorphic encryption. (English) Zbl 1330.94037

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 102-118 (2013).
MSC:  94A60 68P15
PDFBibTeX XMLCite
Full Text: DOI

Discrete Gaussian leftover hash lemma over infinite domains. (English) Zbl 1320.94059

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 97-116 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attribute-based encryption for circuits from multilinear maps. (English) Zbl 1311.94080

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 479-499 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Candidate multilinear maps from ideal lattices. (English) Zbl 1300.94055

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 1-17 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Packed ciphertexts in LWE-based homomorphic encryption. (English) Zbl 1314.94058

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 1-13 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Ring switching in BGV-style homomorphic encryption. (English) Zbl 1310.94147

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 19-37 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Homomorphic evaluation of the AES circuit. (English) Zbl 1296.94117

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 850-867 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Better bootstrapping in fully homomorphic encryption. (English) Zbl 1290.94077

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 1-16 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully homomorphic encryption with polylog overhead. (English) Zbl 1297.94071

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 465-482 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-tolerant interactive protocols. (English) Zbl 1296.94088

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 266-284 (2012).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. (English) Zbl 1292.94066

Ostrovsky, Rafail (ed.), Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science – FOCS 2011, Palm Springs, CA, USA, October 22–25. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-4571-4; 978-1-4577-1843-4/ebook). 107-116 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collision-free hashing from lattice problems. (English) Zbl 1343.94055

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 30-39 (2011).
MSC:  94A60 11H06
PDFBibTeX XMLCite
Full Text: DOI Link

Secure computation on the web: computing without simultaneous interaction. (English) Zbl 1287.94070

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 132-150 (2011).
MSC:  94A60 94B25 94C10 94C15
PDFBibTeX XMLCite
Full Text: DOI

Implementing Gentry’s fully-homomorphic encryption scheme. (English) Zbl 1281.94026

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 129-148 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

After-the-fact leakage in public-key encryption. (English) Zbl 1295.94078

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 107-124 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

One-pass HMQV and asymmetric key-wrapping. (English) Zbl 1291.94094

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 317-334 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. (English) Zbl 1280.94061

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 155-172 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A simple BGN-type cryptosystem from LWE. (English) Zbl 1280.94060

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 506-522 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully homomorphic encryption over the integers. (English) Zbl 1279.94130

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 24-43 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

More on key wrapping. (English) Zbl 1267.94061

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 53-70 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. (English) Zbl 1173.94004

Lecture Notes in Computer Science 5677. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). xiv, 692 p. (2009).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Hierarchical identity based encryption with polynomially many levels. (English) Zbl 1213.94102

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 437-456 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Circular-secure encryption from decision Diffie-Hellman. (English) Zbl 1183.94025

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 108-125 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Threshold RSA for dynamic and ad-hoc groups. (English) Zbl 1149.94316

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 88-107 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Degradation and amplification of computational hardness. (English) Zbl 1162.94365

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 626-643 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Invertible universal hashing and the TET encryption mode. (English) Zbl 1215.94049

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 412-429 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Mitigating dictionary attacks on password-protected local storage. (English) Zbl 1161.94436

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 160-179 (2006).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Strengthening digital signatures via randomized hashing. (English) Zbl 1161.94443

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 41-59 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Chosen ciphertext secure public key threshold encryption without random oracles. (English) Zbl 1125.94012

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 226-243 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. (English) Zbl 1097.94002

Lecture Notes in Computer Science 3876. Berlin: Springer (ISBN 3-540-32731-2/pbk). xi, 617 p. (2006).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Universally composable password-based key exchange. (English) Zbl 1137.94367

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 404-421 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively-secure, non-interactive public-key encryption. (English) Zbl 1079.94537

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 150-168 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hardness amplification of weakly verifiable puzzles. (English) Zbl 1079.94538

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 17-33 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the random-oracle methodology as applied to length-restricted signature schemes. (English) Zbl 1197.94215

Naor, Moni (ed.), Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19–21, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21000-8/pbk). Lecture Notes in Computer Science 2951, 40-57 (2004).
MSC:  94A62 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

A parallelizable enciphering mode. (English) Zbl 1196.94055

Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 292-304 (2004).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Chosen-ciphertext security from identity-based encryption. (English) Zbl 1122.94358

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 207-222 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

EME*: Extending EME to handle arbitrary-length messages with associated data. (English) Zbl 1113.94310

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 315-327 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A tweakable enciphering mode. (English) Zbl 1122.94374

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 482-499 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A forward-secure public-key encryption scheme. (English) Zbl 1037.68532

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 255-271 (2003).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Cryptanalysis of stream ciphers with linear masking. (English) Zbl 1026.94525

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 515-532 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Private approximation of NP-hard functions. (English) Zbl 1323.68569

Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6–8, 2001. New York, NY: ACM Press (ISBN 1-581-13349-9). 550-559 (2001).
PDFBibTeX XMLCite
Full Text: DOI

The modular inversion hidden number problem. (English) Zbl 1062.94545

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 36-51 (2001).
MSC:  94A60 11T71 68Q25
PDFBibTeX XMLCite
Full Text: Link

Exposure-resilient functions and all-or-nothing transforms. (English) Zbl 1082.94508

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 453-469 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Computing inverses over a shared secret modulus. (English) Zbl 1082.94538

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 190-206 (2000).
MSC:  94A62
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software