×

Found 69 Documents (Results 1–69)

A provably secure group signature scheme from code-based assumptions. (English) Zbl 1396.94075

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 260-285 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Group signatures from lattices: simpler, tighter, shorter, ring-based. (English) Zbl 1345.94075

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 427-449 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Low probability differentials and the cryptanalysis of full-round CLEFIA-128. (English) Zbl 1306.94050

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 141-157 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hardness of \(k\)-LWE and applications in traitor tracing. (English) Zbl 1343.94071

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 315-334 (2014).
MSC:  94A60 68P25 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Lattice-based group signature scheme with verifier-local revocation. (English) Zbl 1335.94063

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 345-361 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Revocable IBE systems with almost constant-size key update. (English) Zbl 1307.94100

Cao, Zhenfu (ed.) et al., Pairing-based cryptography – Pairing 2013. 6th international conference, Beijing, China, November 22–24, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-319-04872-7/pbk). Lecture Notes in Computer Science 8365, 168-185 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Feasibility and practicability of standardized cryptography on 4-bit micro controllers. (English) Zbl 1327.94055

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 184-201 (2013).
MSC:  94A60 14G50 68M07
PDFBibTeX XMLCite
Full Text: DOI Link

Algebraic curves in cryptography. (English) Zbl 1282.94001

Discrete Mathematics and Its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4200-7946-3/hbk; 978-1-138-38141-4/pbk; 978-0-429-18703-2/ebook). xvii, 321 p (2013).
PDFBibTeX XMLCite
Full Text: DOI

Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications. (English) Zbl 1314.94087

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 107-124 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Shorter IBE and signatures via asymmetric pairings. (English) Zbl 1305.94038

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 122-140 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. (English) Zbl 1312.94039

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 50-67 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Standardized signature algorithms on ultra-constrained 4-bit MCU. (English) Zbl 1292.94046

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 37-50 (2012).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Differential attacks against stream cipher ZUC. (English) Zbl 1292.94154

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 262-277 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the (in)security of IDEA in various hashing modes. (English) Zbl 1312.94099

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 163-179 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Revocable identity-based encryption from lattices. (English) Zbl 1308.94064

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 390-403 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. (English) Zbl 1294.94079

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 353-371 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved meet-in-the-middle cryptanalysis of KTANTAN (poster). (English) Zbl 1295.94153

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 433-438 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. (English) Zbl 1214.94002

Lecture Notes in Computer Science 6639. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). viii, 295 p. (2011).
PDFBibTeX XMLCite
Full Text: DOI

Pushing the limits: a very compact and a threshold implementation of AES. (English) Zbl 1281.94044

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 69-88 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Advanced meet-in-the-middle preimage attacks: first results on full Tiger, and improved results on MD4 and SHA-2. (English) Zbl 1253.94051

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 56-75 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

256 bit standardized crypto for 650 GE – GOST revisited. (English) Zbl 1297.94098

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 219-233 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes. (English) Zbl 1234.94073

Parker, Matthew G. (ed.), Cryptography and coding. 12th IMA international conference, cryptography and coding 2009, Cirencester, UK, December 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10867-9/pbk). Lecture Notes in Computer Science 5921, 263-277 (2009).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI

Practical pseudo-collisions for hash functions ARIRANG-224/384. (English) Zbl 1267.94063

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 141-156 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the LAKE hash family. (English) Zbl 1248.94057

Dunkelman, Orr (ed.), Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22–25, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03316-2/pbk). Lecture Notes in Computer Science 5665, 156-179 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Coding and cryptology. Second international workshop, IWCC 2009, Zhangjiajie, China, June 1–5, 2009. Proceedings. (English) Zbl 1167.94001

Lecture Notes in Computer Science 5557. Berlin: Springer (ISBN 978-3-642-01813-8/pbk). viii, 275 p. (2009).
PDFBibTeX XMLCite
Full Text: DOI

New informations on the structure of the functional codes defined by forms of degree \(h\) on non-degenerate Hermitian varieties in \(\mathbb{P}^{n(\mathbb{F}_q)\). arXiv:0907.4548

Preprint, arXiv:0907.4548 [math.AG] (2009).
MSC:  05B25 11T71 14J29
BibTeX Cite
Full Text: arXiv

Strongly multiplicative and 3-multiplicative linear secret sharing schemes. (English) Zbl 1172.94607

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 19-36 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of Rabbit. (English) Zbl 1181.94100

Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 204-214 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of LASH. (English) Zbl 1154.68411

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 207-223 (2008).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. (English) Zbl 1155.94004

Series on Coding Theory and Cryptology 4. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). x, 277 p. (2008).
PDFBibTeX XMLCite

Cryptology and network security. 6th international conference, CANS 2007, Singapore, December 8–10, 2007. Proceedings. (English) Zbl 1152.94304

Lecture Notes in Computer Science 4856. Berlin: Springer (ISBN 978-3-540-76968-2/pbk). xii, 283 p. (2007).
PDFBibTeX XMLCite
Full Text: DOI

Improved bounds on Weil sums over Galois rings and homogeneous weights. (English) Zbl 1151.11337

Ytrehus, Øyvind (ed.), Coding and cryptography. International workshop, WCC 2005, Bergen, Norway, March 14–18, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-35481-6/pbk). Lecture Notes in Computer Science 3969, 412-426 (2006).
MSC:  11L03 11T71 94B10
PDFBibTeX XMLCite
Full Text: DOI

Improved \(p\)-ary codes and sequence families from Galois rings. (English) Zbl 1143.94358

Helleseth, T. (ed.) et al., Sequences and their applications – SETA 2004. Third international conference, Seoul, Korea, October 24–28, 2004. Revised selected papers. Berlin: Springer (ISBN 978-3-540-26084-4/pbk). Lecture Notes in Computer Science 3486, 236-242 (2005).
MSC:  94B05 94B40 11T23
PDFBibTeX XMLCite
Full Text: DOI

Duadic codes. (English) Zbl 1014.94013

Sunada, Toshikazu (ed.) et al., Proceedings of the third Asian mathematical conference 2000, University of the Philippines, Diliman, Philippines, October 23-27, 2000. Singapore: World Scientific. 324-336 (2002).
MSC:  94B15 11T71
PDFBibTeX XMLCite

Counting the number of points on affine diagonal curves. (English) Zbl 0994.11025

Lam, Kwok-Yan (ed.) et al., Cryptography and computational number theory. Proceedings of the workshop, CCNT’99, Singapore, November 22-26, 1999. Basel: Birkhäuser. Prog. Comput. Sci. Appl. Log. 20, 15-24 (2001).
PDFBibTeX XMLCite

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software