×

Found 57 Documents (Results 1–57)

Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU. (English) Zbl 1327.94076

Mohapatra, Ram N. (ed.) et al., Mathematics and computing. Selected papers based on the presentations at the 2nd international conference, ICMC, Haldia, India, January 5–10, 2015. New Delhi: Springer (ISBN 978-81-322-2451-8/hbk; 978-81-322-2452-5/ebook). Springer Proceedings in Mathematics & Statistics 139, 349-361 (2015).
MSC:  94A60 68W30 11T71
PDFBibTeX XMLCite
Full Text: DOI

Security model and analysis of FHMQV, revisited. (English) Zbl 1347.94048

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 255-269 (2014).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Fine-grained conditional proxy re-encryption and application. (English) Zbl 1368.94134

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 206-222 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Multivariate signature scheme using quadratic forms. (English) Zbl 1306.94098

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 243-258 (2013).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Application of scalar multiplication of Edwards curves to pairing-based cryptography. (English) Zbl 1292.94158

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 19-36 (2012).
MSC:  94A60 14H45 14G50
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of randomized arithmetic codes based on Markov model. (English) Zbl 1292.94164

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 341-362 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure keyword search using Bloom filter with specified character positions. (English) Zbl 1304.68044

Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 235-252 (2012).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-user keyword search scheme for secure data sharing with fine-grained access control. (English) Zbl 1365.94473

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 406-418 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Reducing the key size of rainbow using non-commutative rings. (English) Zbl 1292.94157

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 68-83 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A security analysis of uniformly-layered Rainbow. Revisiting Sato-Araki’s non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm. (English) Zbl 1290.94159

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 275-294 (2011).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

General fault attacks on multivariate public key cryptosystems. (English) Zbl 1290.94084

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 1-18 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. (English) Zbl 1325.68086

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 83-97 (2011).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Adaptive and composable non-committing encryptions. (English) Zbl 1323.94146

Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 135-144 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A note on the (im)possibility of using obfuscators to transform private-key encryption into public-key encryption. (English) Zbl 1391.94756

Miyaji, Atsuko (ed.) et al., Advances in information and computer security. Second international workshop on security, IWSEC 2007, Nara, Japan, October 29–31, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75650-7/pbk). Lecture Notes in Computer Science 4752, 1-12 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in information and computer security. First international workshop on security, IWSEC 2006, Kyoto, Japan, October 23–24, 2006. Proceedings. (English) Zbl 1151.68311

Lecture Notes in Computer Science 4266. Berlin: Springer (ISBN 978-3-540-47699-3/pbk). xiii, 438 p. (2006).
PDFBibTeX XMLCite
Full Text: DOI

Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic. (English) Zbl 1272.94082

Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 79-94 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: Link

On the pseudorandomness of a modification of KASUMI type permutations. (English) Zbl 1133.94326

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 313-329 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simple power analysis on fast modular reduction with NIST recommended elliptic curves. (English) Zbl 1122.94401

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 169-180 (2005).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Generic, optimistic, and efficient schemes for fair certified email delivery. (English) Zbl 1122.94439

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 40-52 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

An evenhanded certified email system for contract signing. (English) Zbl 1122.94421

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 1-13 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of a 2/3-rate double length compression function in the black-box model. (English) Zbl 1140.94364

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 243-254 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A distributed online certificate status protocol with a single public key. (English) Zbl 1198.94154

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 389-401 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On security of XTR public key cryptosystems against side channel attacks. (English) Zbl 1098.94614

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 454-465 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A generalization of PGV-hash functions and security analysis in black-box model. (English) Zbl 1098.94622

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 212-223 (2004).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A new attack with side channel leakage during exponent recoding computations. (English) Zbl 1104.68495

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 298-311 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Modified power-analysis attacks on XTR and an efficient countermeasure. (English) Zbl 1109.94346

Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 305-317 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Timing attack against implementation of a parallel algorithm for modular exponentiation. (English) Zbl 1131.68455

Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 319-330 (2003).
MSC:  68P25 68M07 94A60
PDFBibTeX XMLCite
Full Text: DOI

Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. (English) Zbl 1131.94327

Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 265-279 (2003).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Single-path authenticated-encryption scheme based on universal hashing. (English) Zbl 1027.68597

Nyberg, Kaisa (ed.) et al., Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15-16, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2595, 94-109 (2003).
MSC:  68P25 94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

A reject timing attack on an IND-CCA2 public-key cryptosystem. (English) Zbl 1031.94526

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 359-373 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

New semantically secure public-key cryptosystems from the RSA-primitive. (English) Zbl 1055.94530

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 1-16 (2002).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: Link

Risks with raw-key masking – the security evaluation of 2-key XCBC. (English) Zbl 1023.94524

Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 327-341 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using Montgomery trick. (English) Zbl 1028.94025

Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 564-578 (2002).
PDFBibTeX XMLCite
Full Text: Link

A certified e-mail system with receiver’s selective usage of delivery authority. (English) Zbl 1033.94559

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 326-338 (2002).
MSC:  94A62 68U35
PDFBibTeX XMLCite
Full Text: Link

On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling. (English) Zbl 1024.94512

Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 420-435 (2002).
MSC:  94A60 68P25 14G50
PDFBibTeX XMLCite
Full Text: Link

Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint Hamming weight representation of scalars. (English) Zbl 1019.68577

Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 484-499 (2002).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

A second-order DPA attack breaks a window-method based countermeasure against side channel attacks. (English) Zbl 1019.68574

Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 389-401 (2002).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks. (English) Zbl 0999.94541

Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 428-439 (2002).
PDFBibTeX XMLCite

Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring. (English) Zbl 0999.94529

Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 81-102 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite

On the power of multidoubling in speeding up elliptic scalar multiplication. (English) Zbl 1067.94560

Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 268-283 (2001).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: Link

Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the \(y\)-coordinate on a Montgomery-form elliptic curve. (English) Zbl 1012.94551

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 126-141 (2001).
MSC:  94A60 14G50 68P25
PDFBibTeX XMLCite
Full Text: Link

On zero-knowledge proofs: “from membership to decision” (extended abstract). (English) Zbl 1296.68077

Proceedings of the thirty-second annual ACM symposium on theory of computing (STOC 2000), Portland, Oregon, USA, May 21–23, 2000. New York, NY: ACM Press (ISBN 1-58113-184-4). 255-264 (2000).
MSC:  68Q25 94A60
PDFBibTeX XMLCite
Full Text: DOI

An anonymous electronic bidding protocol based on a new convertible group signature scheme. On the importance of hiding the winner’s identity against bid-rigging. (English) Zbl 0963.94519

Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 385-399 (2000).
MSC:  94A62
PDFBibTeX XMLCite

Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance. (English) Zbl 0963.94017

Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 59-73 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. (English) Zbl 0963.94026

Roy, Bimal (ed.) et al., Progress in cryptology - INDOCRYPT 2000. 1st international conference in cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1977, 178-190 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Efficient algorithms for the Jacobian variety of hyperelliptic curves \(y^2=x^p-x+1\) over a finite field of odd characteristic \(p\). (English) Zbl 1009.11047

Buchmann, Johannes (ed.) et al., Coding theory, cryptography and related areas. Proceedings of an international conference, Guanajuato, Mexico, April 1998. Berlin: Springer. 73-89 (2000).
MSC:  11G20 11T71 94A60
PDFBibTeX XMLCite

Making hash functions from block ciphers secure and efficient by using convolutional codes. (English) Zbl 0969.94017

Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 391-404 (2000).
MSC:  94A60 68P25 94B10
PDFBibTeX XMLCite

Elliptic curves with the Montgomery-form and their cryptographic applications. (English) Zbl 0969.94021

Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 238-257 (2000).
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software