×

Found 103 Documents (Results 1–100)

How to sequentialize independent parallel attacks? Biased distributions have a phase transition. (English) Zbl 1382.94073

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 704-731 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Sound proof of proximity of knowledge. (English) Zbl 1388.94081

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 105-126 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On privacy for RFID. (English) Zbl 1388.94080

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 3-20 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Capacity and data complexity in multidimensional linear attack. (English) Zbl 1369.94540

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 141-160 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Optimal proximity proofs. (English) Zbl 1400.94125

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 170-190 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Better algorithms for LWE and LWR. (English) Zbl 1365.94424

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 173-202 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Boosting OMD for almost free authentication of associated data. (English) Zbl 1382.94156

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 411-427 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Protecting against multidimensional linear and truncated differential cryptanalysis by decorrelation. (English) Zbl 1367.94301

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 73-91 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Compact and efficient UC commitments under atomic-exchanges. (English) Zbl 1344.94032

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, Korea, December 3–5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 381-401 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

OMD: a compression function mode of operation for authenticated encryption. (English) Zbl 1382.94083

Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 112-128 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Misuse-resistant variants of the OMD authenticated encryption mode. (English) Zbl 1368.94148

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 55-70 (2014).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Smashing WEP in a passive attack. (English) Zbl 1321.94089

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 155-178 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Towards secure distance bounding. (English) Zbl 1321.94047

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 55-67 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the key schedule of lightweight block ciphers. (English) Zbl 1344.94057

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 124-142 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Improved linear cryptanalysis of reduced-round MIBS. (English) Zbl 1417.94041

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 204-220 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On selection of samples in algebraic attacks and a new technique to find hidden low degree equations. (English) Zbl 1318.94081

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 50-65 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Breaking the IOC authenticated encryption mode. (English) Zbl 1288.94054

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 126-135 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. (English) Zbl 1291.94001

Lecture Notes in Computer Science 8479. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). xviii, 586 p. (2014).
PDFBibTeX XMLCite
Full Text: DOI

Primeless factoring-based cryptography. Solving the complexity bottleneck of public-key generation. (English) Zbl 1416.94044

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 7954, 552-569 (2013).
MSC:  94A60 11Y05
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – INDOCRYPT 2013. 14th international conference on cryptology in India, Mumbai, India, December 7–10, 2013. Proceedings. (English) Zbl 1278.94005

Lecture Notes in Computer Science 8250. Berlin: Springer (ISBN 978-3-319-03514-7/pbk). xvii, 319 p. (2013).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Input-aware equivocable commitments and UC-secure commitments with atomic exchanges. (English) Zbl 1283.94055

Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23–25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 121-138 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Secure and lightweight distance-bounding. (English) Zbl 1412.94156

Avoine, Gildas (ed.) et al., Lightweight cryptography for security and privacy. Second international workshop, LightSec 2013, Gebze, Turkey, May 6–7, 2013. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8162, 97-113 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

HELEN: a public-key cryptosystem based on the LPN and the decisional minimal distance problems. (English) Zbl 1312.94047

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 107-126 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The Bussard-Bagga and other distance-bounding protocols under attacks. (English) Zbl 1283.94048

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 371-391 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Resistance against adaptive plaintext-ciphertext iterated distinguishers. (English) Zbl 1295.94019

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 528-544 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ElimLin algorithm revisited. (English) Zbl 1282.94039

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 306-325 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Several weak bit-commitments using seal-once tamper-evident devices. (English) Zbl 1283.94054

Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 70-87 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Synthetic linear analysis: improved attacks on CubeHash and Rabbit. (English) Zbl 1369.94553

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 248-260 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Resistance against iterated attacks by decorrelation revisited. (English) Zbl 1295.94018

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 741-757 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the pseudorandom function assumption in (secure) distance-bounding protocols. PRF-ness alone does not stop the frauds! (English) Zbl 1283.94053

Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 100-120 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. (English) Zbl 1241.94006

Lecture Notes in Computer Science 7374. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). xi, 424 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. (English) Zbl 1234.94005

Lecture Notes in Computer Science 7118. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). xiii, 431 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

On hiding a plaintext length by preencryption. (English) Zbl 1311.94099

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 345-358 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Statistical attack on RC4. Distinguishing WPA. (English) Zbl 1281.94053

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 343-363 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Discovery and exploitation of new biases in RC4. (English) Zbl 1290.94128

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 74-91 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of reduced-round MIBS block cipher. (English) Zbl 1294.94033

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 1-19 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Distinguishing distributions using Chernoff information. (English) Zbl 1286.94043

Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 144-165 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

ARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware. (English) Zbl 1227.94027

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 398-412 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On the impossibility of strong encryption over \(\aleph_0\). (English) Zbl 1248.94087

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Second international workshop, IWCC 2009, Zhangjiajie, China, June 1–5, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01813-8/pbk). Lecture Notes in Computer Science 5557, 202-218 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Smashing SQUASH-0. (English) Zbl 1239.94061

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 300-312 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On the security of HB\(^{\#}\) against a man-in-the-middle attack. (English) Zbl 1206.94084

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 108-124 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The complexity of distinguishing distributions (invited talk). (English) Zbl 1162.94334

Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 210-222 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. (English) Zbl 1137.94002

Lecture Notes in Computer Science 5023. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). xi, 415 p. (2008).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Hash-and-sign with weak hashing made secure. (English) Zbl 1213.94161

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 338-354 (2007).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

\(\mathcal{TCH}o\): A hardware-oriented trapdoor cipher. (English) Zbl 1213.94078

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 184-199 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On privacy models for RFID. (English) Zbl 1153.94434

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 68-87 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Passive-only key recovery attacks on RC4. (English) Zbl 1154.94437

Adams, Carlisle (ed.) et al., Selected areas in cryptography. 14th international workshop, SAC 2007, Ottawa, Canada, August 16–17, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77359-7/pbk). Lecture Notes in Computer Science 4876, 344-359 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear cryptanalysis of non binary ciphers. (English) Zbl 1154.94371

Adams, Carlisle (ed.) et al., Selected areas in cryptography. 14th international workshop, SAC 2007, Ottawa, Canada, August 16–17, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77359-7/pbk). Lecture Notes in Computer Science 4876, 184-211 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

When stream cipher analysis meets public-key cryptography. (English) Zbl 1161.94398

Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 266-284 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Short 2-move undeniable signatures. (English) Zbl 1295.94186

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 19-36 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Proving the security of AES substitution-permutation network. (English) Zbl 1151.94477

Preneel, Bart (ed.) et al., Selected areas in cryptography. 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005. Revised selected papers. Berlin: Springer (ISBN 978-3-540-33108-7/pbk). Lecture Notes in Computer Science 3897, 65-81 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

SAS-based authenticated key agreement. (English) Zbl 1151.94559

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 395-409 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. (English) Zbl 1108.94002

Lecture Notes in Computer Science 4004. Berlin: Springer (ISBN 3-540-34546-9/pbk). xiv, 613 p. (2006).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

An optimal non-interactive message authentication protocol. (English) Zbl 1125.94038

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 280-294 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure communications over insecure channels based on short authenticated strings. (English) Zbl 1145.94475

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 309-326 (2005).
MSC:  94A62 94A05 94A24
PDFBibTeX XMLCite
Full Text: DOI

The conditional correlation attack: A practical attack on Bluetooth encryption. (English) Zbl 1145.94446

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 97-117 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Enforcing email addresses privacy using tokens. (English) Zbl 1151.94625

Feng, Dengguo (ed.) et al., Information security and cryptology. First SKLOIS conference, CISC 2005, Beijing, China, December 15–17, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30855-5/pbk). Lecture Notes in Computer Science 3822, 91-100 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Chaum’s designated confirmer signature revisited. (English) Zbl 1127.94370

Zhou, Jianying (ed.) et al., Information security. 8th international conference, ISC 2005, Singapore, September 20–23, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29001-X/pbk). Lecture Notes in Computer Science 3650, 164-178 (2005).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

FOX: A new family of block ciphers. (English) Zbl 1117.94322

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 114-129 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Perfect diffusion primitives for block ciphers. Building efficient MDS matrices. (English) Zbl 1117.94010

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 84-99 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimization of the MOVA undeniable signature scheme. (English) Zbl 1126.94349

Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 196-209 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. (English) Zbl 1089.94001

Lecture Notes in Computer Science 3715. Berlin: Springer (ISBN 3-540-28938-0/pbk). xi, 329 p. (2005).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. (English) Zbl 1069.94502

Lecture Notes in Computer Science 3386. Berlin: Springer (ISBN 3-540-24454-9/pbk). xiii, 433 p. (2005).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Undeniable signatures based on characters: How to sign with one bit. (English) Zbl 1198.94158

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 69-85 (2004).
MSC:  94A62 11T71
PDFBibTeX XMLCite
Full Text: DOI

On the use of GF-inversion as a cryptographic primitive. (English) Zbl 1081.94014

Matsui, Mitsuru (ed.) et al., Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14–15, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21370-8/pbk). Lecture Notes in Computer Science 3006, 234-247 (2004).
MSC:  94A60 11T71 05A05
PDFBibTeX XMLCite
Full Text: DOI

Optimistic fair exchange based on publicly verifiable secret sharing. (English) Zbl 1098.94611

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 74-85 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Faster correlation attack on Bluetooth keystream generator E0. (English) Zbl 1104.94311

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 407-425 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On some weak extensions of AES and BES. (English) Zbl 1109.94349

Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 414-426 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of Bluetooth keystream generator two-level E0. (English) Zbl 1094.94516

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 483-499 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How far can we go beyond linear cryptanalysis? (English) Zbl 1094.94025

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 432-450 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic homomorphic undeniable signatures. (English) Zbl 1094.94034

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 354-371 (2004).
MSC:  94A60 20K99 94A62
PDFBibTeX XMLCite
Full Text: DOI

Optimal key ranking procedures in a statistical cryptanalysis. (English) Zbl 1254.94036

Johansson, Thomas (ed.), Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Berlin: Springer (ISBN 3-540-20449-0/pbk). Lect. Notes Comput. Sci. 2887, 235-246 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Password interception in a SSL/TLS channel. (English) Zbl 1122.94362

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 583-599 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS. (English) Zbl 1056.94517

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 534-545 (2002).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: Link

The security of DSA and ECDSA. (English) Zbl 1033.94544

Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 309-323 (2002).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. (English) Zbl 0984.00083

Lecture Notes in Computer Science. 2259. Berlin: Springer. xi, 359 p. (2001).
MSC:  00B25 94-06 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the pseudorandomness of top-level schemes of block ciphers. (English) Zbl 0966.94013

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 289-302 (2000).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software