×

Found 76 Documents (Results 1–76)

Compactly hiding linear spans. Tightly secure constant-size simulation-sound QA-NIZK proofs and applications. (English) Zbl 1380.94112

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 681-707 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure efficient history-hiding append-only signatures in the standard model. (English) Zbl 1345.94074

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 450-473 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Born and raised distributively, fully distributed non-interactive adaptively-secure threshold signatures with short shares. (English) Zbl 1321.94077

Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 303-312 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Concise multi-challenge CCA-secure encryption and signatures with almost tight security. (English) Zbl 1311.94107

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 1-21 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Non-malleability from malleability: simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures. (English) Zbl 1300.94111

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 514-532 (2014).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Group signatures with message-dependent opening in the standard model. (English) Zbl 1301.94136

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 286-306 (2014).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Traceable group encryption. (English) Zbl 1300.94079

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 592-610 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Toward practical group encryption. (English) Zbl 1300.94053

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 237-252 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A scalable scheme for privacy-preserving aggregation of time-series data. (English) Zbl 1300.94065

Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1–5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 111-125 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linearly homomorphic structure-preserving signatures and their applications. (English) Zbl 1296.94154

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 289-307 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient cryptosystems from \(2^k\)-th power residue symbols. (English) Zbl 1300.94064

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 76-92 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Partial key exposure on RSA with private exponents larger than \(N\). (English) Zbl 1291.94108

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 369-380 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Security aspects in information technology. First international conference, InfoSecHiComNet 2011, Haldia, India, October 19–22, 2011. Proceedings. (English) Zbl 1225.68020

Lecture Notes in Computer Science 7011. Berlin: Springer (ISBN 978-3-642-24585-5/pbk). xiv, 187 p. (2011).
PDFBibTeX XMLCite
Full Text: DOI

Memory-constrained implementations of elliptic curve cryptography in co-\(Z\) coordinate representation. (English) Zbl 1280.94071

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 170-187 (2011).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Binary Huff curves. (English) Zbl 1284.94068

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 340-355 (2011).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. (English) Zbl 1200.94008

Lecture Notes in Computer Science 6487. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). xiii, 467 p. (2010).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Coordinate blinding over large prime fields. (English) Zbl 1300.94097

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 443-455 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Co-\(Z\) addition formulæ and binary ladders on elliptic curves. (Extended abstract). (English) Zbl 1297.94072

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 65-79 (2010).
MSC:  94A60 14G50 68P25
PDFBibTeX XMLCite
Full Text: DOI

Efficient arithmetic on Hessian curves. (English) Zbl 1279.94072

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 243-260 (2010).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Chosen-ciphertext secure RSA-type cryptosystems. (English) Zbl 1267.94052

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 32-46 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Highly regular \(m\)-ary powering ladders. (English) Zbl 1267.94071

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 350-363 (2009).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: DOI

On cryptographic schemes based on discrete logarithms and factoring. (English) Zbl 1287.94076

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 41-52 (2009).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

Exponent recoding and regular exponentiation algorithms. (English) Zbl 1246.94031

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 334-349 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An efficient on-line/off-line signature scheme without random oracles. (English) Zbl 1300.94110

Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 98-107 (2008).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Fast point multiplication on elliptic curves without precomputation. (English) Zbl 1202.94184

von zur Gathen, Joachim (ed.) et al., Arithmetic of finite fields. 2nd international workshop, WAIFI 2008, Siena, Italy, July 6–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69498-4/pbk). Lecture Notes in Computer Science 5130, 36-46 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Twisted Edwards curves. (English) Zbl 1142.94332

Vaudenay, Serge (ed.), Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 389-405 (2008).
PDFBibTeX XMLCite
Full Text: DOI Link

RSA moduli with a predetermined portion: techniques and applications. (English) Zbl 1300.94061

Chen, Liqun (ed.) et al., Information security practice and experience. 4th international conference, ISPEC 2008, Sydney, Australia, April 21–23, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79103-4/pbk). Lecture Notes in Computer Science 4991, 116-130 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Highly regular right-to-left algorithms for scalar multiplication. (English) Zbl 1300.94062

Paillier, Pascal (ed.) et al., Cryptographic hardware and embedded systems – CHES 2007. 9th international workshop, Vienna, Austria, September 10–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74734-5/pbk). Lecture Notes in Computer Science 4727, 135-147 (2007).
MSC:  94A60 68M07
PDFBibTeX XMLCite
Full Text: DOI

On the notions of PRP-RKA, KR and KR-RKA for block ciphers. (English) Zbl 1138.94372

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 188-197 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

On the TYS signature scheme. (English) Zbl 1171.94352

Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 338-344 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Fast generation of prime numbers on portable devices: an update. (English) Zbl 1300.94067

Goubin, Louis (ed.) et al., Cryptographic hardware and embedded systems – CHES 2006. 8th international workshop, Yokohama, Japan, October 10–13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-46559-1/pbk). Lecture Notes in Computer Science 4249, 160-173 (2006).
MSC:  94A60 11Y11
PDFBibTeX XMLCite
Full Text: DOI

A practical and tightly secure signature scheme without hash function. (English) Zbl 1177.94183

Abe, Masayuki (ed.), Topics in cryptology – CT-RSA 2007. The cryptographers’ track at the RSA conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-69327-7/pbk). Lecture Notes in Computer Science 4377, 339-356 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

On second-order differential power analysis. (English) Zbl 1300.94068

Rao, Josyula R. (ed.) et al., Cryptographic hardware and embedded systems – CHES 2005. 7th international workshop, Edinburgh, UK, August 29–September 1, 2005. Proceedings. Berlin: Springer (ISBN 978-3-540-28474-1/pbk). Lecture Notes in Computer Science 3659, 293-308 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in elliptic curve cryptography. (English) Zbl 1089.94018

London Mathematical Society Lecture Note Series 317. Cambridge: Cambridge University Press (ISBN 0-521-60415-X). xvi, 281 p. (2005).
PDFBibTeX XMLCite
Full Text: DOI

Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. (English) Zbl 1056.68012

Lecture Notes in Computer Science 3156. Berlin: Springer (ISBN 3-540-22666-4/pbk). xiii, 455 p. (2004).
PDFBibTeX XMLCite
Full Text: DOI

GCD-free algorithms for computing modular inverses. (English) Zbl 1274.11176

Walter, Colin D. (ed.) et al., Cryptographic hardware and embedded systems – CHES 2003. 5th international workshop, Cologne, Germany, September 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40833-9/pbk). Lect. Notes Comput. Sci. 2779, 243-253 (2003).
MSC:  11Y16 11T71 94A60
PDFBibTeX XMLCite
Full Text: DOI

Faster double-size modular multiplication from Euclidean multipliers. (English) Zbl 1274.11173

Walter, Colin D. (ed.) et al., Cryptographic hardware and embedded systems – CHES 2003. 5th international workshop, Cologne, Germany, September 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40833-9/pbk). Lect. Notes Comput. Sci. 2779, 214-227 (2003).
MSC:  11Y16 11T71 94A60
PDFBibTeX XMLCite

(Virtually) free randomization techniques for elliptic curve cryptography. (English) Zbl 1300.94047

Qing, Sihan (ed.) et al., Information and communication security. 5th international conference, ICICS 2003, Huhehaote, China, October 10–13, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20150-5/pbk). Lect. Notes Comput. Sci. 2836, 348-359 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast point multiplication on elliptic curves through isogenies. (English) Zbl 1030.11027

Fossorier, Marc (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 15th international symposium, AAECC-15, Toulouse, France, May 12-16, 2003. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2643, 43-50 (2003).
MSC:  11G20 94A60 11T71
PDFBibTeX XMLCite
Full Text: Link

The Jacobi model of an elliptic curve and side-channel analysis. (English) Zbl 1031.94510

Fossorier, Marc (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 15th international symposium, AAECC-15, Toulouse, France, May 12-16, 2003. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2643, 34-42 (2003).
MSC:  94A60 11G07 11F50
PDFBibTeX XMLCite
Full Text: Link

Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. (English) Zbl 1017.00055

Lecture Notes in Computer Science. 2612. Berlin: Springer. xi, 416 p. (2003).
MSC:  00B25 94-06 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

New minimal modified radix-\(r\) representation with applications to smart cards. (English) Zbl 1055.94517

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 375-383 (2002).
MSC:  94A60 11A63
PDFBibTeX XMLCite
Full Text: Link

One-way cross-trees and their applications. (English) Zbl 1055.94536

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 346-356 (2002).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Weierstraß elliptic curves and side-channel attacks. (English) Zbl 1055.94512

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 335-345 (2002).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

Optimal chosen-ciphertext secure encryption of arbitrary-length messages. (English) Zbl 1056.68542

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 17-33 (2002).
MSC:  68P25 94A60 68Q25
PDFBibTeX XMLCite
Full Text: Link

GEM: a Generic chosen-ciphertext secure Ecryption Method. (English) Zbl 1048.94504

Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 263-276 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Observability analysis: Detecting when improved cryptosystems fail. (English) Zbl 1048.94507

Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 17-29 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Universal padding schemes for RSA. (English) Zbl 1026.94526

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 226-241 (2002).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: Link

Universal exponentiation algorithm. A first step towards provable SPA-resistance. (English) Zbl 1007.68995

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 300-308 (2001).
MSC:  68U99 68P25 94A60
PDFBibTeX XMLCite

Hessian elliptic curves and side-channel attacks. (English) Zbl 1012.94547

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 402-410 (2001).
MSC:  94A60 14G50 68P25
PDFBibTeX XMLCite
Full Text: Link

Protections against differential analysis for elliptic curve cryptography. An algebraic approach. (English) Zbl 1012.94550

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 377-390 (2001).
MSC:  94A60 14G50 68P25
PDFBibTeX XMLCite
Full Text: Link

Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation). (English) Zbl 1024.68527

Honary, Bahram (ed.), Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17-19, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2260, 114-127 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact encoding of non-adjacent forms with applications to elliptic curve cryptography. (English) Zbl 0994.94522

Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 353-364 (2001).
MSC:  94A60 14G50 11T71
PDFBibTeX XMLCite

On the power of misbehaving adversaries and security analysis of the original EPOC. (English) Zbl 0988.94513

Naccache, David (ed.), Topics in cryptology - CT-RSA 2001. The cryptographer’s track at RSA conference 2001, San Francisco, CA, USA, April 8-12, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2020, 208-222 (2001).
MSC:  94A60
PDFBibTeX XMLCite

New attacks on PKCS#1 V1.5 encryption. (English) Zbl 1082.94512

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 369-381 (2000).
MSC:  94A60
PDFBibTeX XMLCite

A practical and provably secure coalition-resistant group signature scheme. (English) Zbl 0995.94544

Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 255-270 (2000).
MSC:  94A62
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field