×

Found 110 Documents (Results 1–100)

Robust pseudo-random number generators with input secure against side-channel attacks. (English) Zbl 1423.94044

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 635-654 (2015).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Implicit zero-knowledge arguments and applications to the malicious setting. (English) Zbl 1351.94026

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 107-129 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Disjunctions for hash proof systems: new constructions and applications. (English) Zbl 1326.94065

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 69-100 (2015).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Simple functional encryption schemes for inner products. (English) Zbl 1345.94028

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 733-751 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public-key encryption indistinguishable under plaintext-checkable attacks. (English) Zbl 1345.94027

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 332-352 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Divisible e-cash made practical. (English) Zbl 1345.94046

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 77-100 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Forward secure non-interactive key exchange. (English) Zbl 1309.94151

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 21-39 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. (English) Zbl 1290.94003

Lecture Notes in Computer Science 8469. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). xiii, 476 p. (2014).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Efficient delegation of zero-knowledge proofs of knowledge in a pairing-friendly setting. (English) Zbl 1335.94035

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 167-184 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis and improvement of Lindell’s UC-secure commitment schemes. (English) Zbl 1416.94043

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 7954, 534-551 (2013).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

SPHF-friendly non-interactive commitments. (English) Zbl 1327.94023

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 214-234 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New techniques for SPHFs and efficient one-round PAKE protocols. (English) Zbl 1310.94125

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 449-475 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Tighter reductions for forward-secure signature schemes. (English) Zbl 1314.94098

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 292-311 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient UC-secure authenticated key-exchange for algebraic languages. (English) Zbl 1292.94168

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 272-291 (2013).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Decentralized dynamic broadcast encryption. (English) Zbl 1310.94165

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 166-183 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Compact round-optimal partially-blind signatures. (English) Zbl 1310.94126

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 95-112 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Message-based traitor tracing with optimal ciphertext rate. (English) Zbl 1303.94097

Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 56-77 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. (English) Zbl 1308.94084

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 308-321 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Password-based authenticated key exchange. (English) Zbl 1294.94098

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 390-397 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Round-optimal privacy-preserving protocols with smooth projective hash functions. (English) Zbl 1303.94069

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 94-111 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Autotomic signatures. (English) Zbl 1300.94113

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 143-155 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Traceable signature with stepping capabilities. (English) Zbl 1300.94103

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 108-131 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. (English) Zbl 1239.94002

Lecture Notes in Computer Science 7237. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). xiv, 758 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. (English) Zbl 1216.94004

Lecture Notes in Computer Science 6737. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). xi, 387 p. (2011).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Security notions for broadcast encryption. (English) Zbl 1311.94095

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 377-394 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Signatures on randomizable ciphertexts. (English) Zbl 1291.94180

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 403-422 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Contributory password-authenticated group key exchange with join capability. (English) Zbl 1284.94131

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 142-160 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Mediated traceable anonymous encryption. (English) Zbl 1285.94071

Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 40-60 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On some incompatible properties of voting schemes. (English) Zbl 1284.68242

Chaum, David (ed.) et al., Towards trustworthy elections. New directions in electronic voting. Berlin: Springer (ISBN 978-3-642-12979-7/pbk). Lecture Notes in Computer Science 6000, 191-199 (2010).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. (English) Zbl 1188.94010

Lecture Notes in Computer Science 6056. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). xiii, 519 p. (2010).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Flexible group key exchange with on-demand computation of subgroup keys. (English) Zbl 1284.94049

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 351-368 (2010).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI Link

Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords. (English) Zbl 1284.94056

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 297-315 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Smooth projective hashing for conditionally extractable commitments. (English) Zbl 1252.94039

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 671-689 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Proofs on encrypted values in bilinear groups and an application to anonymity of signatures. (English) Zbl 1248.94104

Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 132-149 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Password-authenticated group key agreement with adaptive security and contributiveness. (English) Zbl 1246.94017

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 254-271 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

New anonymity notions for identity-based encryption. (English) Zbl 1242.68102

Cortier, Véronique (ed.) et al., Formal to practical security. Papers issued from the 2005–2008 French-Japanese collaboration. Berlin: Springer (ISBN 978-3-642-02001-8/pbk). Lecture Notes in Computer Science 5458, 138-157 (2009).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Anonymous consecutive delegation of signing rights: unifying group and proxy signatures. (English) Zbl 1242.94035

Cortier, Véronique (ed.) et al., Formal to practical security. Papers issued from the 2005–2008 French-Japanese collaboration. Berlin: Springer (ISBN 978-3-642-02001-8/pbk). Lecture Notes in Computer Science 5458, 95-115 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Applied cryptography and network security. 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2–5, 2009. Proceedings. (English) Zbl 1163.94301

Lecture Notes in Computer Science 5536. Berlin: Springer (ISBN 978-3-642-01956-2/pbk). xiii, 535 p. (2009).
PDFBibTeX XMLCite
Full Text: DOI

Optimal randomness extraction from a Diffie-Hellman element. (English) Zbl 1239.94043

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 572-589 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Distributed public-key cryptography from weak secrets. (English) Zbl 1227.94018

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 139-159 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Dynamic threshold public-key encryption. (English) Zbl 1183.94028

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 317-334 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New anonymity notions for identity-based encryption. (English) Zbl 1180.94053

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 375-391 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Anonymous proxy signatures. (English) Zbl 1180.94071

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 201-217 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient two-party password-based key exchange protocols in the UC framework. (English) Zbl 1153.94340

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 335-351 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

An application of the Goldwasser-Micali cryptosystem to biometric authentication. (English) Zbl 1213.94152

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 96-106 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Extended private information retrieval and its application in biometrics authentications. (English) Zbl 1245.94068

Bao, Feng (ed.) et al., Cryptology and network security. 6th international conference, CANS 2007, Singapore, December 8–10, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76968-2/pbk). Lecture Notes in Computer Science 4856, 175-193 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. (English) Zbl 1151.94502

Takagi, Tsuyoshi (ed.) et al., Pairing-based cryptography – Pairing 2007. First international conference, Tokyo, Japan, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73488-8/pbk). Lecture Notes in Computer Science 4575, 39-59 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Dynamic fully anonymous short group signatures. (English) Zbl 1295.94177

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 193-210 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 5th international conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings. (English) Zbl 1151.94302

Lecture Notes in Computer Science 4301. Berlin: Springer (ISBN 978-3-540-49462-1/pbk). xiii, 381 p. (2006).
PDFBibTeX XMLCite
Full Text: DOI

A new key exchange protocol based on MQV assuming public computations. (English) Zbl 1152.94430

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 186-200 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

About the security of MTI/C0 and MQV. (English) Zbl 1152.94429

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 156-172 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A scalable password-based group key exchange protocol in the standard model. (English) Zbl 1172.94554

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 332-347 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Hardness of distinguishing the MSB or LSB of secret keys in Diffie-Hellman schemes. (English) Zbl 1133.94317

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 240-251 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Automated security proofs with sequences of games. (English) Zbl 1161.94388

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 537-554 (2006).
MSC:  94A60 68Q05 91A80
PDFBibTeX XMLCite
Full Text: DOI

Password-based group key exchange in a constant number of rounds. (English) Zbl 1151.94470

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 427-442 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The twist-aUgmented technique for key exchange. (English) Zbl 1151.94495

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 410-426 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Encoding-free elGamal encryption without random oracles. (English) Zbl 1151.94494

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 91-104 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. (English) Zbl 1098.94003

Lecture Notes in Computer Science 3860. Berlin: Springer (ISBN 3-540-31033-9/pbk). xi, 365 p. (2006).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Public traceability in traitor tracing schemes. (English) Zbl 1137.94368

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 542-558 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A simple threshold authenticated key exchange from short secrets. (English) Zbl 1154.94446

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 566-584 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Optimal asymmetric encryption and signature paddings. (English) Zbl 1126.68388

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 254-268 (2005).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

About the security of ciphers (semantic security and pseudo-random permutations). (English) Zbl 1117.94332

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 182-197 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security notions for public-key encryption schemes. (English) Zbl 1116.94329

Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 33-46 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Interactive Diffie-Hellman assumptions with applications to password-based authentication. (English) Zbl 1120.94304

Patrick, Andrew S. (ed.) et al., Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 – March 3, 2005. Revised papers. Berlin: Springer (ISBN 3-540-26656-9/pbk). Lecture Notes in Computer Science 3570, 341-356 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Simple password-based encrypted key exchange protocols. (English) Zbl 1079.94529

Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 191-208 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Password-based authenticated key exchange in the three-party setting. (English) Zbl 1081.94513

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 65-84 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

One-time verifier-based encrypted key exchange. (English) Zbl 1081.94512

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 47-64 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New security results on encrypted key exchange. (English) Zbl 1198.94085

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 145-158 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

IPAKE: Isomorphisms for password-based authenticated key exchange. (English) Zbl 1104.94046

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 477-493 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

How to disembed a program? (Extended abstract). (English) Zbl 1104.68469

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 441-454 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

OAEP 3-round: a generic and secure asymmetric encryption padding. (English) Zbl 1094.94519

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 63-77 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. (English) Zbl 1205.94075

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 37-54 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen-ciphertext security without redundancy. (English) Zbl 1205.94096

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 1-18 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The impact of decryption failures on the security of NTRU encryption. (English) Zbl 1122.94377

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 226-246 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Parallel authentication and public-key encryption. (English) Zbl 1045.94541

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 387-401 (2003).
MSC:  94A62 68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

The group Diffie-Hellman problems. (English) Zbl 1066.94536

Nyberg, Kaisa (ed.) et al., Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15–16, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00622-2/pbk). Lect. Notes Comput. Sci. 2595, 325-338 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme. (English) Zbl 1051.94510

Syverson, Paul F. (ed.), Financial cryptography. 5th international conference, FC 2001, Grand Cayman, British West Indies, February 19–22, 2001. Proceedings. Berlin: Springer (ISBN 3-540-44079-8). Lect. Notes Comput. Sci. 2339, 319-338 (2002).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

Mutual authentication for low-power mobile devices. (English) Zbl 1051.94512

Syverson, Paul F. (ed.), Financial cryptography. 5th international conference, FC 2001, Grand Cayman, British West Indies, February 19–22, 2001. Proceedings. Berlin: Springer (ISBN 3-540-44079-8). Lect. Notes Comput. Sci. 2339, 178-195 (2002).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

Dynamic group Diffie-Hellman key exchange under standard assumptions. (English) Zbl 1055.94009

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 321-336 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Optimal chosen-ciphertext secure encryption of arbitrary-length messages. (English) Zbl 1056.68542

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 17-33 (2002).
MSC:  68P25 94A60 68Q25
PDFBibTeX XMLCite
Full Text: Link

GEM: a Generic chosen-ciphertext secure Ecryption Method. (English) Zbl 1048.94504

Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 263-276 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Group Diffie-Hellman key exchange secure against dictionary attacks. (English) Zbl 1065.94540

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 497-514 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis and improvements of NTRU encryption paddings. (English) Zbl 1026.94538

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 210-225 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Flaws in applying proof methodologies to signature schemes. (English) Zbl 1026.94550

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 93-110 (2002).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Practical multi-candidate election system. (English) Zbl 1333.94030

Proceedings of the 20th annual ACM symposium on principles of distributed computing, PODC ’01, Newport, RI, USA, August 26–28, 2001. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-383-9). 274-283 (2001).
MSC:  94A60 68M14
PDFBibTeX XMLCite
Full Text: DOI Link

Key-privacy in public-key encryption. (English) Zbl 1064.94553

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 566-582 (2001).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: Link

Threshold cryptosystems secure against chosen-ciphertext attacks. (English) Zbl 1064.94545

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 351-368 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Provably authenticated group Diffie-Hellman key exchange – the dynamic case. (English) Zbl 1064.94555

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 290-309 (2001).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

RSA-OAEP is secure under the RSA assumption. (English) Zbl 1002.94524

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 260-274 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Number theory and public-key cryptography. (English) Zbl 1008.94546

Hong, Sungpyo (ed.) et al., Combinatorial and computational mathematics: present and future. Papers from the workshop, Pohang, Republic of Korea, February 15-17, 2000. Singapore: World Scientific. 178-209 (2001).
MSC:  94A60 11Y40
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software