×

Found 73 Documents (Results 1–73)

Practical approaches to varying network size in combinatorial key predistribution schemes. (English) Zbl 1321.94146

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 89-117 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Socio-rational secret sharing as a new direction in rational cryptography. (English) Zbl 1283.94099

Grossklags, Jens (ed.) et al., Decision and game theory for security. Third international conference, GameSec 2012, Budapest, Hungary, November 5–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34265-3/pbk). Lecture Notes in Computer Science 7638, 18-37 (2012).
MSC:  94A62 91A35 91A80
PDFBibTeX XMLCite
Full Text: DOI

Unconditionally secure signature schemes revisited. (English) Zbl 1295.94189

Fehr, Serge (ed.), Information theoretic security. 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21–24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20727-3/pbk). Lecture Notes in Computer Science 6673, 100-116 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. (English) Zbl 1208.94008

Lecture Notes in Computer Science 6544. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). xiii, 411 p. (2011).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Group testing and batch verification. (English) Zbl 1282.94073

Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 140-157 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A highly scalable RFID authentication protocol. (English) Zbl 1284.94147

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 360-376 (2009).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Key refreshing in wireless sensor networks. (English) Zbl 1162.94342

Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 156-170 (2008).
MSC:  94A60 68M14
PDFBibTeX XMLCite
Full Text: DOI

A critical analysis and improvement of AACS drive-host authentication. (English) Zbl 1279.94139

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 37-52 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Bent functions. 2nd ed. (English) Zbl 1221.94062

Colbourn, Charles J. (ed.) et al., The CRC handbook of combinatorial designs. Boca Raton, FL: Chapman & Hall/CRC (ISBN 1-58488-506-8/hbk). Discrete Mathematics and its Applications, 337-339 (2007).
MSC:  94A60 94A55 11T71
PDFBibTeX XMLCite

Tree-based key distribution patterns. (English) Zbl 1151.94534

Preneel, Bart (ed.) et al., Selected areas in cryptography. 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005. Revised selected papers. Berlin: Springer (ISBN 978-3-540-33108-7/pbk). Lecture Notes in Computer Science 3897, 189-204 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Deterministic key predistribution schemes for distributed sensor networks. (English) Zbl 1117.94343

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 294-307 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

New minimal weight representations for left-to-right window methods. (English) Zbl 1079.94566

Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 366-383 (2005).
MSC:  94A60 11A63 14G50
PDFBibTeX XMLCite
Full Text: DOI

Alternative digit sets for nonadjacent representations. (English) Zbl 1081.94031

Matsui, Mitsuru (ed.) et al., Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14–15, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21370-8/pbk). Lecture Notes in Computer Science 3006, 306-319 (2004).
MSC:  94A60 11A67
PDFBibTeX XMLCite
Full Text: DOI

Fault tolerant and distributed broadcast encryption. (English) Zbl 1039.94513

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 263-280 (2003).
MSC:  94A60 68P25 94A05
PDFBibTeX XMLCite
Full Text: Link

New results on unconditionally secure distributed oblivious transfer. (English) Zbl 1066.94553

Nyberg, Kaisa (ed.) et al., Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15–16, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00622-2/pbk). Lect. Notes Comput. Sci. 2595, 291-309 (2003).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

On unconditionally secure robust distributed key distribution centers. (English) Zbl 1065.94544

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 346-363 (2002).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the Sakazaki-Okamoto-Mambo ID-based key distribution system over elliptic curves. (English) Zbl 1016.94516

Mullen, Gary L. (ed.) et al., Finite fields with applications to coding theory, cryptography and related areas. Proceedings of the 6th international conference on finite fields and applications, Oaxaca, México, May 21-25, 2001. Berlin: Springer. 263-269 (2002).
MSC:  94A60
PDFBibTeX XMLCite

Generalized zig-zag functions and oblivious transfer reductions. (English) Zbl 1067.94526

Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 87-102 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Provably secure distributed Schnorr signatures and a \((t,n)\) threshold scheme for implicit certificates. (English) Zbl 1005.94538

Varadharajan, Vijay (ed.) et al., Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2119, 417-434 (2001).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Unconditionally secure proactive secret sharing scheme with combinatorial structures. (English) Zbl 0993.94554

Heys, Howard (ed.) et al., Selected areas in cryptography. 6th annual international workshop, SAC ’99. Kingston, Ontario, Canada, August 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1758, 200-214 (2000).
MSC:  94A62 05B40
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field