×

Found 72 Documents (Results 1–72)

Combined cache timing attacks and template attacks on stream cipher MUGI. (English) Zbl 1403.94054

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 235-249 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Estimating differential-linear distinguishers and applications to CTC2. (English) Zbl 1403.94060

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 220-234 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fault attacks on stream cipher Scream. (English) Zbl 1403.94055

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 50-64 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Solving linear equations modulo unknown divisors: revisited. (English) Zbl 1344.94062

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 189-213 (2015).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: DOI

A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers. (English) Zbl 1382.94113

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 389-410 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Speeding up the search algorithm for the best differential and best linear trails. (English) Zbl 1400.94115

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 259-285 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. (English) Zbl 1319.94006

Lecture Notes in Computer Science 8957. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). xiii, 547 p. (2015).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

On the indifferentiability of key-alternating Feistel ciphers with no key derivation. (English) Zbl 1354.94031

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 110-133 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Environment-bound SAML assertions: a fresh approach to enhance the security of SAML assertions. (English) Zbl 1347.94026

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 361-376 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Omega pairing on hyperelliptic curves. (English) Zbl 1347.94027

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 167-184 (2014).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Near collision attack on the Grain v1 stream cipher. (English) Zbl 1321.94097

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 518-538 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. (English) Zbl 1319.94005

Lecture Notes in Computer Science 8567. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). xiii, 408 p. (2014).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

New partial key exposure attacks on CRT-RSA with large public exponents. (English) Zbl 1353.94060

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 151-162 (2014).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: DOI

A new method for solving polynomial systems with noise over \(\mathbb{F}_2\) and its applications in cold boot key recovery. (English) Zbl 1327.94051

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 16-33 (2013).
MSC:  94A60 11T06
PDFBibTeX XMLCite
Full Text: DOI

Factoring multi-power RSA modulus \(N = p^r q\) with partial known bits. (English) Zbl 1285.94078

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 57-71 (2013).
MSC:  94A60 11Y05
PDFBibTeX XMLCite
Full Text: DOI

Cube cryptanalysis of LBlock with noisy leakage. (English) Zbl 1342.94081

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 141-155 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Construction of resilient and nonlinear Boolean functions with almost perfect immunity to algebraic and fast algebraic attacks. (English) Zbl 1311.94101

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 276-293 (2013).
MSC:  94A60 94C10 06E30
PDFBibTeX XMLCite
Full Text: DOI

Fast evaluation of T-functions via time-memory trade-offs. (English) Zbl 1290.94131

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 263-275 (2013).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Stronger security model for public-key encryption with equality test. (English) Zbl 1305.94062

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 65-82 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An improved twisted Ate pairing over KSS curves with \(k = 18\). (English) Zbl 1291.94067

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 35-45 (2013).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

On efficient pairings on elliptic curves over extension fields. (English) Zbl 1291.94175

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 1-18 (2013).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Analysis of optimum pairing products at high security levels. (English) Zbl 1295.94165

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 412-430 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Perfect algebraic immune functions. (English) Zbl 1292.94104

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 172-189 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast Tate pairing computation on twisted Jacobi intersections curves. (English) Zbl 1292.94163

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 210-226 (2012).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Anonymous identity-based hash proof system and its applications. (English) Zbl 1303.94074

Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 143-160 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. (English) Zbl 1253.94006

Lecture Notes in Computer Science 7537. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). ix, 394 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Identity-based extractable hash proofs and their applications. (English) Zbl 1319.94056

Bao, Feng (ed.) et al., Applied cryptography and network security. 10th international conference, ACNS 2012, Singapore, June 26–29, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31283-0/pbk). Lecture Notes in Computer Science 7341, 153-170 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear weaknesses in \(T\)-functions. (English) Zbl 1304.94086

Helleseth, Tor (ed.) et al., Sequences and their applications – SETA 2012. 7th international conference, Waterloo, ON, Canada, June 4–8, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30614-3/pbk). Lecture Notes in Computer Science 7280, 279-290 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The initialization stage analysis of ZUC v1.5. (English) Zbl 1307.94114

Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 40-53 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient pairing computation on ordinary elliptic curves of embedding degree 1 and 2. (English) Zbl 1282.14047

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 309-326 (2011).
MSC:  14G50 11T71 94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. (English) Zbl 1232.68010

Lecture Notes in Computer Science 7092. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). ix, 313 p. (2011).
PDFBibTeX XMLCite
Full Text: DOI

Resettable cryptography in constant rounds – the case of zero knowledge. (English) Zbl 1227.94041

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 390-406 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. (English) Zbl 1218.94005

Lecture Notes in Computer Science 6584. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). xiv, 524 p. (2011).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Results on the immunity of Boolean functions against probabilistic algebraic attacks. (English) Zbl 1279.94096

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 34-46 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attacking Bivium and Trivium with the characteristic set method. (English) Zbl 1280.94070

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 77-91 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. (English) Zbl 1200.94007

Lecture Notes in Computer Science 6151. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). xiii, 460 p. (2010).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Refinement of Miller’s algorithm over Edwards curves. (English) Zbl 1272.94066

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 106-118 (2010).
MSC:  94A60 14G50 11G07
PDFBibTeX XMLCite
Full Text: DOI

An interesting member ID-based group signature. (English) Zbl 1206.94101

Dong, Chongying (ed.) et al., Recent developments in algebra and related areas. Papers of the international conference on algebra and related areas, Tsinghua University, Beijing, China, August 18–20, 2007. Dedicated to Zhexian Wan in honor of his 80th birthday. Somerville, MA: International Press; Beijing: Higher Education Press (ISBN 978-1-57146-135-3/pbk). Advanced Lectures in Mathematics (ALM) 8, 279-302 (2009).
MSC:  94A60 68P25 11T71
PDFBibTeX XMLCite

Concurrently non-malleable black-box zero knowledge in the bare public-key model. (English) Zbl 1248.94063

Frid, Anna (ed.) et al., Computer science – theory and applications. Fourth international computer science symposium in Russia, CSR 2009, Novosibirsk, Russia, August 18–23, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03350-6/pbk). Lecture Notes in Computer Science 5675, 80-91 (2009).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. (English) Zbl 1160.94004

Lecture Notes in Computer Science 5487. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). xiii, 439 p. (2009).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Unlinkable randomizable signature and its application in group signature. (English) Zbl 1166.94347

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 328-342 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Resettable zero knowledge with concurrent soundness in the bare public-key model under standard assumption. (English) Zbl 1166.94334

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 123-137 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. (English) Zbl 1155.94007

Lecture Notes in Computer Science 4990. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). xii, 534 p. (2008).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Instance-dependent verifiable random functions and their application to simultaneous resettability. (English) Zbl 1141.94349

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 148-168 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. (English) Zbl 1151.94004

Lecture Notes in Computer Science 4318. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). xi, 305 p. (2006).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Shorter verifier-local revocation group signatures from bilinear maps. (English) Zbl 1307.94125

Pointcheval, David (ed.) et al., Cryptology and network security. 5th international conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49462-1/pbk). Lecture Notes in Computer Science 4301, 126-143 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of some threshold signature schemes and multi-signature schemes. (English) Zbl 1151.94598

Feng, Dengguo (ed.) et al., Information security and cryptology. First SKLOIS conference, CISC 2005, Beijing, China, December 15–17, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30855-5/pbk). Lecture Notes in Computer Science 3822, 233-241 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. First SKLOIS conference, CISC 2005, Beijing, China, December 15–17, 2005. Proceedings. (English) Zbl 1099.94001

Lecture Notes in Computer Science 3822. Berlin: Springer (ISBN 3-540-30855-5/pbk). xii, 420 p. (2005).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Database

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software