×

Found 100 Documents (Results 1–100)

A simple and improved algorithm for integer factorization with implicit hints. (English) Zbl 1382.11095

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 258-269 (2015).
MSC:  11Y05 94A60
PDFBibTeX XMLCite
Full Text: DOI

IBE under \(k\)-LIN with shorter ciphertexts and private keys. (English) Zbl 1356.94068

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 145-159 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

(Batch) fully homomorphic encryption over integers for non-binary message spaces. (English) Zbl 1370.94534

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 537-555 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to construct strongly secure network coding scheme. (English) Zbl 1395.94295

Padró, Carles (ed.), Information theoretic security. 7th international conference, ICITS 2013, Singapore, November 28–30, 2013. Proceedings. Cham: Springer (ISBN 978-3-319-04267-1/pbk; 978-3-319-04268-8/ebook). Lecture Notes in Computer Science 8317, 1-17 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Kurosawa-Desmedt key encapsulation mechanism, revisited. (English) Zbl 1288.94068

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 51-68 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

2-pass key exchange protocols from CPA-secure KEM. (English) Zbl 1337.94046

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 385-401 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to factor \(N_1\) and \(N_2\) when \(p_1=p_2 \bmod 2^t\). (English) Zbl 1344.11079

Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41382-7/pbk). Lecture Notes in Computer Science 8231, 217-225 (2013).
MSC:  11Y05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage resilient IBE and IPE under the DLIN assumption. (English) Zbl 1356.94067

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 487-501 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. (English) Zbl 1258.94004

Lecture Notes in Computer Science 7778. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). xiv, 518 p. (2013).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Relation between verifiable random functions and convertible undeniable signatures, and new constructions. (English) Zbl 1288.94071

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 235-246 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Simple and efficient single round almost perfectly secure message transmission tolerating generalized adversary. (English) Zbl 1435.94126

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 292-308 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic fully simulatable adaptive oblivious transfer. (English) Zbl 1288.94070

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 274-291 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

The round complexity of perfectly secure general VSS. (English) Zbl 1295.94174

Fehr, Serge (ed.), Information theoretic security. 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21–24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20727-3/pbk). Lecture Notes in Computer Science 6673, 143-162 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptography for unconditionally secure message transmission in networks (invited talk) (Abstract). (English) Zbl 1294.94057

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 43 (2010).
MSC:  94A60 68M14 68P25
PDFBibTeX XMLCite
Full Text: DOI

Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. (English) Zbl 1197.94005

Lecture Notes in Computer Science 6402. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). x, 279 p. (2010).
PDFBibTeX XMLCite
Full Text: DOI

Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. (English) Zbl 1196.94011

Lecture Notes in Computer Science 5973. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). x, 249 p. (2010).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Provably secure convertible undeniable signatures with unambiguity. (English) Zbl 1288.94088

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 291-308 (2010).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficiency-improved fully simulatable adaptive OT under the DDH assumption. (English) Zbl 1288.94069

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 172-181 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Simple adaptive oblivious transfer without random oracle. (English) Zbl 1267.94078

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 334-346 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Almost secure (1-round, \(n\)-channel) message transmission scheme. (English) Zbl 1263.94030

Desmedt, Yvo (ed.), Information theoretic security. Second international conference, ICITS 2007, Madrid, Spain, May 25–29, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-642-10229-5/pbk). Lecture Notes in Computer Science 4883, 99-112 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

New RSA-based (selectively) convertible undeniable signature schemes. (English) Zbl 1246.94047

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 116-134 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. (English) Zbl 1206.94070

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 308-325 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simple direct reduction of string (1,2)-OT to Rabin’s OT without privacy amplification. (English) Zbl 1162.94379

Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 199-209 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A universally composable group key exchange protocol with minimum communication effort. (English) Zbl 1180.94052

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 392-408 (2008).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Universally composable undeniable signature. (English) Zbl 1155.94398

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 524-535 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Small secret key attack on a variant of RSA (due to Takagi). (English) Zbl 1161.94408

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 387-406 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Truly efficient 2-round perfectly secure message transmission scheme. (English) Zbl 1149.94324

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 324-340 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A generalization and a variant of two threshold cryptosystems based on factoring. (English) Zbl 1138.94362

Garay, Juan A. (ed.) et al., Information security. 10th international conference, ISC 2007, Valparaíso, Chile, October 9–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75495-4/pbk). Lecture Notes in Computer Science 4779, 351-361 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. (English) Zbl 1135.94001

Lecture Notes in Computer Science 4833. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). xiv, 583 p. (2007).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Deterministic polynomial time equivalence between factoring and key-recovery attack on Takagi’s RSA. (English) Zbl 1161.94412

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 412-425 (2007).
MSC:  94A60 11Y11
PDFBibTeX XMLCite
Full Text: DOI

Relations among security notions for undeniable signature schemes. (English) Zbl 1152.94431

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 34-48 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Birthday paradox for multi-collisions. (English) Zbl 1272.94064

Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 29-40 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New approach for selectively convertible undeniable signature schemes. (English) Zbl 1172.94619

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 428-443 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

An efficient compiler from \(\Sigma\)-protocol to 2-move deniable zero-knowledge. (English) Zbl 1133.94343

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 46-57 (2006).
MSC:  94A62 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Tag-kem from set partial domain one-way permutations. (English) Zbl 1176.94026

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 360-370 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

The power of identification schemes. (English) Zbl 1151.94530

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 364-377 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

New online/offline signature schemes without random oracles. (English) Zbl 1151.94531

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 330-346 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

3-move undeniable signature scheme. (English) Zbl 1137.94375

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 181-197 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. (English) Zbl 1137.94336

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 128-146 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to enhance the security of the 3GPP confidentiality and integrity algorithms. (English) Zbl 1140.94348

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 268-283 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The security of the FDH variant of Chaum’s undeniable signature scheme. (English) Zbl 1081.94552

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 328-345 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

From digital signature to ID-based identification/signature. (English) Zbl 1198.94155

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 248-261 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Short exponent Diffie-Hellman problems. (English) Zbl 1198.94105

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 173-186 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Almost ideal contrast visual cryptography with reversing. (English) Zbl 1196.94067

Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 353-365 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

\(k\)-resilient identity-based encryption in the standard model. (English) Zbl 1196.94056

Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 67-80 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of a new variant of OMAC. (English) Zbl 1092.68597

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 67-78 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

How to remove MAC from DHIES. (English) Zbl 1098.94621

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 236-247 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to re-use round function in super-pseudorandom permutation. (English) Zbl 1098.94616

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 224-235 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new paradigm of hybrid encryption scheme. (English) Zbl 1104.94028

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 426-442 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifiable shuffles: a formal model and a Paillier-based efficient construction with provable security. (English) Zbl 1103.68533

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 61-75 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Error correcting and complexity aspects of linear secret sharing schemes. (English) Zbl 1255.94074

Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 396-407 (2003).
MSC:  94A62 68Q17 94A60
PDFBibTeX XMLCite
Full Text: DOI

OMAC: one-key CBC MAC. (English) Zbl 1254.94033

Johansson, Thomas (ed.), Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Berlin: Springer (ISBN 3-540-20449-0/pbk). Lect. Notes Comput. Sci. 2887, 129-153 (2003).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A complete and explicit security reduction algorithm for RSA-based cryptosystems. (English) Zbl 1205.94086

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 474-491 (2003).
MSC:  94A60 11T71 68Q15
PDFBibTeX XMLCite
Full Text: DOI

Some RSA-based encryption schemes with tight security reduction. (English) Zbl 1205.94087

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 19-36 (2003).
PDFBibTeX XMLCite
Full Text: DOI

Stronger security bounds for OMAC, TMAC, and XCBC. (English) Zbl 1123.94348

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 402-415 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms. (English) Zbl 1123.94347

Paterson, Kenneth G. (ed.), Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16–18, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20663-9/pbk). Lect. Notes Comput. Sci. 2898, 306-318 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Square hash with a small key size. (English) Zbl 1042.68571

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 522-531 (2003).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: Link

On the pseudorandomness of KASUMI type permutations. (English) Zbl 1044.94531

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 130-141 (2003).
MSC:  94A60 68Q25 65C10
PDFBibTeX XMLCite
Full Text: Link

TMAC: Two-key CBC MAC. (English) Zbl 1039.94527

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 33-49 (2003).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: Link

Round security and super-pseudorandomness of MISTY type structure. (English) Zbl 1073.68632

Matsui, Mitsuru (ed.), Fast software encryption. 8th international workshop, FSE 2001, Yokohama, Japan, April 2–4, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43869-6). Lect. Notes Comput. Sci. 2355, 233-247 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-cryptographic primitive for pseudorandom permutation. (English) Zbl 1045.94522

Daemen, Joan (ed.) et al., Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers. Berlin: Springer (ISBN 3-540-44009-7). Lect. Notes Comput. Sci. 2365, 149-163 (2002).
MSC:  94A60 68N99 68P25
PDFBibTeX XMLCite
Full Text: Link

Linear code implies public-key traitor tracing. (English) Zbl 1055.94523

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 172-187 (2002).
MSC:  94A60 94B05
PDFBibTeX XMLCite
Full Text: Link

Multi-recipient public-key encryption with shortened ciphertext. (English) Zbl 1055.94522

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 48-63 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

New covering radius of Reed-Muller codes for \(t\)-resilient functions. (English) Zbl 1067.94539

Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 75-86 (2001).
PDFBibTeX XMLCite
Full Text: Link

Generic algorithms and key agreement protocols based on group actions. (English) Zbl 1076.94529

Eades, Peter (ed.) et al., Algorithms and computation. 12th international symposium, ISAAC 2001, Christchurch, New Zealand, December 19–21, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42985-9). Lect. Notes Comput. Sci. 2223, 208-218 (2001).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

IND-CCA public key schemes equivalent to factoring \(n=pq\). (English) Zbl 0991.94041

Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 36-47 (2001).
MSC:  94A60
PDFBibTeX XMLCite

How to break a practical MIX and design a new one. (English) Zbl 1082.94516

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 557-572 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Provably secure metering scheme. (English) Zbl 0977.68032

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 388-398 (2000).
MSC:  68P25 68M10 94A60
PDFBibTeX XMLCite

Attack for flash MIX. (English) Zbl 0974.94019

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 192-204 (2000).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software