×

Found 80 Documents (Results 1–80)

Variants of Waters’ dual system primitives using asymmetric pairings. (Extended abstract). (English) Zbl 1290.94121

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 298-315 (2012).
MSC:  94A60
Full Text: DOI

New collision attacks against up to 24-step SHA-2. (Extended abstract). (English) Zbl 1203.94123

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 91-103 (2008).
MSC:  94A60
Full Text: DOI

Construction of a hybrid HIBE protocol secure against adaptive attacks (without random oracle). (English) Zbl 1138.94373

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 51-67 (2007).
MSC:  94A60 68P25
Full Text: DOI

Application of LFSRs for parallel sequence generation in cryptologic algorithms. (English) Zbl 1172.94590

Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 436-445 (2006).
MSC:  94A60
Full Text: DOI

A general construction of tweakable block ciphers and different modes of operations. (English) Zbl 1172.94565

Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 88-102 (2006).
MSC:  94A60 94A55
Full Text: DOI

HIBE with short public parameters without random oracle. (English) Zbl 1172.94569

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 145-160 (2006).
MSC:  94A60
Full Text: DOI

Multi-receiver identity-based key encapsulation with shortened ciphertext. (English) Zbl 1175.94107

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 394-408 (2006).
MSC:  94A62 94A60
Full Text: DOI

HCH: A new tweakable enciphering scheme using the hash-encrypt-hash approach. (English) Zbl 1175.94068

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 287-302 (2006).
MSC:  94A60

Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model. (English) Zbl 1184.94235

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 424-440 (2006).
MSC:  94A60 94A62
Full Text: DOI

Generalization of the selective-ID security model for HIBE protocols. (English) Zbl 1151.94492

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 241-256 (2006).
MSC:  94A60
Full Text: DOI

New applications of time memory data tradeoffs. (English) Zbl 1154.68395

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 353-372 (2005).
MSC:  68P25 94A60
Full Text: DOI

Efficient computation of Tate pairing in projective coordinate over general characteristic fields. (English) Zbl 1133.94310

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 168-181 (2005).
MSC:  94A60 68W30
Full Text: DOI

Application of Montgomery’s trick to scalar multiplication for elliptic and hyperelliptic curves using a fixed base point. (English) Zbl 1198.94115

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 41-54 (2004).
MSC:  94A60 14G50
Full Text: DOI

A generalization of PGV-hash functions and security analysis in black-box model. (English) Zbl 1098.94622

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 212-223 (2004).
MSC:  94A60 68P25
Full Text: DOI

Time-memory trade-off attacks on multiplications and \(T\)-functions. (English) Zbl 1094.94517

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 468-482 (2004).
MSC:  94A60 11T71
Full Text: DOI

Masking based domain extenders for UOWHFs: Bounds and constructions. (English) Zbl 1094.94521

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 187-200 (2004).
MSC:  94A60
Full Text: DOI

New table look-up methods for faster Frobenius map based scalar multiplication over \(\text{GF}(p^n)\). (English) Zbl 1103.68537

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 479-493 (2004).
MSC:  68P25 94A60 94A62
Full Text: DOI

Parallelizing explicit formula for arithmetic in the Jacobian of hyperelliptic curves. (English) Zbl 1205.94091

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 93-110 (2003).
MSC:  94A60 14G50
Full Text: DOI

Extending Joux’s protocol to multi party key agreement (extended abstract). (English) Zbl 1123.94376

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 205-217 (2003).
MSC:  94A62 94A60
Full Text: DOI

Construction of perfect nonlinear and maximally nonlinear multi-output Boolean functions satisfying higher order strict avalanche criteria. (English) Zbl 1123.94340

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 107-120 (2003).
MSC:  94A60 94C10
Full Text: DOI

Improved construction of nonlinear resilient S-boxes. (English) Zbl 1065.94549

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 466-483 (2002).
MSC:  94A60 94B65
Full Text: DOI

Construction of nonlinear Boolean functions with important cryptographic properties. (English) Zbl 1082.94529

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 485-506 (2000).
MSC:  94A60 06E30

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software