×

Found 93 Documents (Results 1–93)

Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. (English) Zbl 1370.94506

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 733-761 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Rotational cryptanalysis of ARX revisited. (English) Zbl 1382.94128

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 519-536 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Rotational cryptanalysis of round-reduced Keccak. (English) Zbl 1321.94081

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 241-262 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ICEPOLE: high-speed, hardware-oriented authenticated encryption. (English) Zbl 1396.94092

Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 392-413 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Low probability differentials and the cryptanalysis of full-round CLEFIA-128. (English) Zbl 1306.94050

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 141-157 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 11th international conference, CANS 2012, Darmstadt, Germany, December 12–14, 2012. Proceedings. (English) Zbl 1295.68028

Lecture Notes in Computer Science 7712. Berlin: Springer (ISBN 978-3-642-35404-5/pbk). xvi, 311 p. (2012).
PDFBibTeX XMLCite

On the (in)security of IDEA in various hashing modes. (English) Zbl 1312.94099

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 163-179 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Active security in multiparty computation over black-box groups. (English) Zbl 1351.94041

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 503-521 (2012).
MSC:  94A60 05C15
PDFBibTeX XMLCite
Full Text: DOI Link

NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. (English) Zbl 1294.94079

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 353-371 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Known and chosen key differential distinguishers for block ciphers. (English) Zbl 1297.94094

Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 29-48 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Lattice-based completely non-malleable PKE in the standard model (poster). (English) Zbl 1295.94144

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 407-411 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the convex hull click human identification protocol. (English) Zbl 1371.94621

Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25–28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 24-30 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A new human identification protocol and Coppersmith’s baby-step giant-step algorithm. (English) Zbl 1350.94028

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 349-366 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. (English) Zbl 1182.94002

Lecture Notes in Computer Science 5985. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). xi, 397 p. (2010).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Extensions of the cube attack based on low degree annihilators. (English) Zbl 1287.94105

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 87-102 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. (English) Zbl 1177.94016

Lecture Notes in Computer Science 5848. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). xii, 275 p. (2009).
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the LAKE hash family. (English) Zbl 1248.94057

Dunkelman, Orr (ed.), Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22–25, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03316-2/pbk). Lecture Notes in Computer Science 5665, 156-179 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-party computation with omnipresent adversary. (English) Zbl 1227.68015

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 180-195 (2009).
MSC:  68M12 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

An improved distinguisher for Dragon. (English) Zbl 1158.94380

Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 91-108 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A critical look at cryptographic hash function literature. (English) Zbl 1160.94383

Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 58-79 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Verifiable multi-secret sharing schemes for multiple threshold access structures. (English) Zbl 1166.94341

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 167-181 (2008).
MSC:  94A62 11A51
PDFBibTeX XMLCite
Full Text: DOI Link

Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. (English) Zbl 1362.94058

Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 178-195 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. (English) Zbl 1155.94008

Lecture Notes in Computer Science 5350. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). xiv, 572 p. (2008).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of LASH. (English) Zbl 1154.68411

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 207-223 (2008).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient disjointness tests for private datasets. (English) Zbl 1279.94127

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 155-169 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new dynamic accumulator for batch updates. (English) Zbl 1285.94115

Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 98-112 (2008).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

On secure multi-party computation in black-box groups. (English) Zbl 1215.94042

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 591-612 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of FORK-256. (English) Zbl 1186.94460

Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 19-38 (2007).
MSC:  94A60 68P25 68N99
PDFBibTeX XMLCite
Full Text: DOI

Multiple modular additions and crossword puzzle attack on NLSv2. (English) Zbl 1138.94356

Garay, Juan A. (ed.) et al., Information security. 10th international conference, ISC 2007, Valparaíso, Chile, October 9–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75495-4/pbk). Lecture Notes in Computer Science 4779, 230-248 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An hybrid approach for efficient multicast stream authentication over unsecured channels. (English) Zbl 1138.94385

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 17-34 (2007).
MSC:  94A62 90B18
PDFBibTeX XMLCite
Full Text: DOI

Crossword puzzle attack on NLS. (English) Zbl 1161.94392

Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 249-265 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. (English) Zbl 1119.94002

Lecture Notes in Computer Science 4586. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). xiv, 476 p. (2007).
PDFBibTeX XMLCite
Full Text: DOI

An ideal and robust threshold RSA. (English) Zbl 1295.94072

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 312-321 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A non-malleable group key exchange protocol robust against active insiders. (English) Zbl 1156.94410

Katsikas, Sokratis K. (ed.) et al., Information security. 9th international conference, ISC 2006, Samos Island, Greece, August 30–September 2, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38341-3/pbk). Lecture Notes in Computer Science 4176, 459-475 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On algebraic immunity and annihilators. (English) Zbl 1272.94071

Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 65-80 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the provable security of an efficient RSA-based pseudorandom generator. (English) Zbl 1172.94597

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 194-209 (2006).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. (English) Zbl 1177.94191

Abe, Masayuki (ed.), Topics in cryptology – CT-RSA 2007. The cryptographers’ track at the RSA conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-69327-7/pbk). Lecture Notes in Computer Science 4377, 357-371 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Distinguishing attack on SOBER-128 with linear masking. (English) Zbl 1176.94035

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 29-39 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Characterisations of extended resiliency and extended immunity of S-boxes. (English) Zbl 1185.94065

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 210-228 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Finding good differential patterns for attacks on SHA-1. (English) Zbl 1151.94545

Ytrehus, Øyvind (ed.), Coding and cryptography. International workshop, WCC 2005, Bergen, Norway, March 14–18, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-35481-6/pbk). Lecture Notes in Computer Science 3969, 164-177 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Higher order universal one-way hash functions from the subset sum assumption. (English) Zbl 1151.94572

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 157-173 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Converse results to the Wiener attack on RSA. (English) Zbl 1081.94537

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 184-198 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. (English) Zbl 1198.94163

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 86-100 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Multiple-time signature schemes against adaptive chosen message attacks. (English) Zbl 1081.94553

Matsui, Mitsuru (ed.) et al., Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14–15, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21370-8/pbk). Lecture Notes in Computer Science 3006, 88-100 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. (English) Zbl 1094.94039

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 170-186 (2004).
MSC:  94A62 11T71
PDFBibTeX XMLCite
Full Text: DOI

Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. (English) Zbl 1053.94002

Lecture Notes in Computer Science 3108. Berlin: Springer (ISBN 3-540-22379-7/pbk). xii, 494 p. (2004).
PDFBibTeX XMLCite
Full Text: DOI

Universal designated-verifier signatures. (English) Zbl 1205.94112

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 523-542 (2003).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient one-time proxy signatures. (English) Zbl 1205.94115

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 507-522 (2003).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Parallel authentication and public-key encryption. (English) Zbl 1045.94541

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 387-401 (2003).
MSC:  94A62 68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Shared generation of pseudo-random functions with cumulative maps. (English) Zbl 1039.94521

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 281-294 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

A combinatorial approach to anonymous membership broadcast. (English) Zbl 1077.94521

Ibarra, Oscar H. (ed.) et al., Computing and combinatorics. 8th annual international conference, COCOON 2002, Singapore, August 15–17, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43996-X). Lect. Notes Comput. Sci. 2387, 162-170 (2002).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Authentication of concast communication. (English) Zbl 1033.94551

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 185-198 (2002).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Cryptanalysis of block ciphers with overdefined systems of equations. (English) Zbl 1065.94543

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 267-287 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cheating immune secret sharing. (English) Zbl 1050.94543

Qing, Sihan (ed.) et al., Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13–16, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42880-1). Lect. Notes Comput. Sci. 2229, 144-149 (2001).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Democratic systems. (English) Zbl 1006.94541

Varadharajan, Vijay (ed.) et al., Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2119, 392-402 (2001).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Identification of bad signatures in batches. (English) Zbl 0966.94024

Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 28-45 (2000).
MSC:  94A62
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software