×

Found 57 Documents (Results 1–57)

Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications. (English) Zbl 1397.94078

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 548-567 (2015).
MSC:  94A60
Full Text: DOI

Communication optimal Tardos-based asymmetric fingerprinting. (English) Zbl 1382.94129

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 469-486 (2015).
MSC:  94A60
Full Text: DOI

End-to-end verifiable elections in the standard model. (English) Zbl 1375.94139

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 468-498 (2015).
MSC:  94A60

The bitcoin backbone protocol: analysis and applications. (English) Zbl 1371.94636

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 281-310 (2015).
MSC:  94A60
Full Text: DOI

A little honesty goes a long way. The two-tier model for secure multiparty computation. (English) Zbl 1354.94029

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 134-158 (2015).
MSC:  94A60
Full Text: DOI

Round-optimal password-protected secret sharing and T-PAKE in the password-only model. (English) Zbl 1311.94106

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 233-253 (2014).
MSC:  94A62
Full Text: DOI

Tamper resilient circuits: the adversary at the gates. (English) Zbl 1314.94078

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 161-180 (2013).
MSC:  94A60 94C10
Full Text: DOI

BiTR: built-in tamper resilience. (English) Zbl 1227.94038

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 740-758 (2011).
MSC:  94A60
Full Text: DOI

Multi-query computationally-private information retrieval with constant communication rate. (English) Zbl 1279.94080

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 107-123 (2010).
MSC:  94A60 68P20 68P25
Full Text: DOI

Secure function collection with sublinear storage. (English) Zbl 1248.94072

Albers, Susanne (ed.) et al., Automata, languages and programming. 36th international colloquium, ICALP 2009, Rhodes, Greece, July 5–12, 2009. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-02929-5/pbk). Lecture Notes in Computer Science 5556, 534-545 (2009).
MSC:  94A60
Full Text: DOI

On the portability of generalized Schnorr proofs. (English) Zbl 1239.94039

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 425-442 (2009).
MSC:  94A60
Full Text: DOI

Zero-knowledge proofs with witness elimination. (English) Zbl 1227.94051

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 124-138 (2009).
MSC:  94A60 94A62
Full Text: DOI

Privacy preserving data mining within anonymous credential systems. (English) Zbl 1180.68151

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 57-76 (2008).
Full Text: DOI

Group encryption. (English) Zbl 1153.94399

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 181-199 (2007).
MSC:  94A60 94A62
Full Text: DOI

Efficient cryptographic protocols realizing e-markets with price discrimination. (English) Zbl 1152.94426

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 311-325 (2006).
MSC:  94A60 91B24
Full Text: DOI

Group signatures with efficient concurrent join. (English) Zbl 1137.94373

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 198-214 (2005).
MSC:  94A62 94A60
Full Text: DOI

Efficient secure group signatures with dynamic joins and keeping anonymity against group managers. (English) Zbl 1126.94347

Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 151-170 (2005).
MSC:  94A62
Full Text: DOI

Anonymous identification in ad hoc groups. (English) Zbl 1122.94414

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 609-626 (2004).
MSC:  94A62
Full Text: DOI

Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. (English) Zbl 1094.94513

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 401-416 (2004).
MSC:  94A60 94A62
Full Text: DOI

Decoding of interleaved Reed Solomon codes over noisy data. (English) Zbl 1042.94529

Baeten, Jos C. M. (ed.) et al., Automata, languages and programming. 30th international colloquium, ICALP 2003, Eindhoven, The Netherland, June 30 – July 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40493-7/pbk). Lect. Notes Comput. Sci. 2719, 97-108 (2003).
MSC:  94B35 94A40

Traitor tracing with constant transmission rate. (English) Zbl 1056.94515

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 450-465 (2002).
MSC:  94A60 68P25

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software