×

Found 58 Documents (Results 1–58)

Narrow bandwidth is not inherent in reverse public-key encryption. (English) Zbl 1378.94057

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 598-607 (2014).
MSC:  94A60
Full Text: DOI

Scalable deniable group key establishment. (English) Zbl 1326.94129

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25–26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 365-373 (2013).
MSC:  94A62 68P25 68M12
Full Text: DOI

Communication-efficient 2-round group key establishment from pairings. (English) Zbl 1284.94143

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 65-76 (2011).
MSC:  94A62 68P25
Full Text: DOI

PET SNAKE: a special purpose architecture to implement an algebraic attack in hardware. (English) Zbl 1366.94495

Gavrilova, Marina L. (ed.) et al., Transactions on Computational Science X. Special issue on security in computing, Part I. Berlin: Springer (ISBN 978-3-642-17498-8/pbk). Lecture Notes in Computer Science 6340. Journal Subline, 298-328 (2010).
MSC:  94A60 68P25
Full Text: DOI

Non-wafer-scale sieving hardware for the NFS: Another attempt to cope with 1024-bit. (English) Zbl 1141.94355

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 466-481 (2007).
MSC:  94A60
Full Text: DOI

(Password) authenticated key establishment: from 2-party to group. (English) Zbl 1129.94040

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 499-514 (2007).
MSC:  94A62 94A60 68P25
Full Text: DOI

Towards provably secure group key agreement building on group theory. (English) Zbl 1295.94025

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 322-336 (2006).
MSC:  94A60 94A62
Full Text: DOI

A practical attack on the root problem in braid groups. (English) Zbl 1207.94054

Gerritzen, Lothar (ed.) et al., Algebraic methods in cryptography. AMS/DMV joint international meeting, June 16–19, 2005, Mainz, Germany. International workshop on algebraic methods in cryptography, November 17–18, 2005, Bochum, Germany. Providence, RI: American Mathematical Society (AMS) (ISBN 0-8218-4037-1/pbk). Contemporary Mathematics 418, 121-131 (2006).
MSC:  94A60 20F36

Towards provable security for cryptographic constructions arising form combinatorial group theory. (English) Zbl 1201.94085

Gerritzen, Lothar (ed.) et al., Algebraic methods in cryptography. AMS/DMV joint international meeting, June 16–19, 2005, Mainz, Germany. International workshop on algebraic methods in cryptography, November 17–18, 2005, Bochum, Germany. Providence, RI: American Mathematical Society (AMS) (ISBN 0-8218-4037-1/pbk). Contemporary Mathematics 418, 89-101 (2006).
MSC:  94A60 20F10

A simpler sieving device: combining ECM and TWIRL. (English) Zbl 1272.94031

Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 118-135 (2006).
MSC:  94A60 14G50 11Y16
Full Text: DOI

A new Cramer-Shoup like methodology for group based provably secure encryption schemes. (English) Zbl 1079.94575

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 495-509 (2005).
MSC:  94A60
Full Text: DOI

On the security and composability of the one time pad. (English) Zbl 1117.94307

Vojtáš, Peter (ed.) et al., SOFSEM 2005: Theory and practice of computer science. 31st conference on current trends in theory and practice of computer science, Liptovský Ján, Slovakia, January 22–28, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24302-X/pbk). Lecture Notes in Computer Science 3381, 288-297 (2005).
MSC:  94A40 68P25
Full Text: DOI

A practical attack on some braid group based cryptographic primitives. (English) Zbl 1033.94528

Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 187-198 (2002).
MSC:  94A60 20F36
Full Text: DOI

Cryptanalysis of two sparse polynomial based public key cryptosystems. (English) Zbl 0988.94510

Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 153-164 (2001).
MSC:  94A60

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software