×

Found 113 Documents (Results 1–100)

A provably secure group signature scheme from code-based assumptions. (English) Zbl 1396.94075

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 260-285 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Group signatures from lattices: simpler, tighter, shorter, ring-based. (English) Zbl 1345.94075

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 427-449 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Low probability differentials and the cryptanalysis of full-round CLEFIA-128. (English) Zbl 1306.94050

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 141-157 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lattice-based group signature scheme with verifier-local revocation. (English) Zbl 1335.94063

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 345-361 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Revocable IBE systems with almost constant-size key update. (English) Zbl 1307.94100

Cao, Zhenfu (ed.) et al., Pairing-based cryptography – Pairing 2013. 6th international conference, Beijing, China, November 22–24, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-319-04872-7/pbk). Lecture Notes in Computer Science 8365, 168-185 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic curves in cryptography. (English) Zbl 1282.94001

Discrete Mathematics and Its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4200-7946-3/hbk; 978-1-138-38141-4/pbk; 978-0-429-18703-2/ebook). xvii, 321 p (2013).
PDFBibTeX XMLCite
Full Text: DOI

Improved differential cache attacks on SMS4. (English) Zbl 1311.94094

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 29-45 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications. (English) Zbl 1314.94087

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 107-124 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Shorter IBE and signatures via asymmetric pairings. (English) Zbl 1305.94038

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 122-140 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. (English) Zbl 1312.94039

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 50-67 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential attacks against stream cipher ZUC. (English) Zbl 1292.94154

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 262-277 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the (in)security of IDEA in various hashing modes. (English) Zbl 1312.94099

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 163-179 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Revisiting a secret sharing approach to network codes. (English) Zbl 1303.94113

Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 300-317 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Revocable identity-based encryption from lattices. (English) Zbl 1308.94064

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 390-403 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. (English) Zbl 1294.94079

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 353-371 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On related-key attacks and KASUMI: the case of A5/3. (English) Zbl 1291.94137

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 146-159 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Oblivious transfer and \(n\)-variate linear function evaluation. (English) Zbl 1353.94042

Fu, Bin (ed.) et al., Computing and combinatorics. 17th annual international conference, COCOON 2011, Dallas, TX, USA, August 14–16, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22684-7/pbk). Lecture Notes in Computer Science 6842, 627-637 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved meet-in-the-middle cryptanalysis of KTANTAN (poster). (English) Zbl 1295.94153

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 433-438 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

An efficient rational secret sharing scheme based on the Chinese remainder theorem. (English) Zbl 1295.94166

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 259-275 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Improving the Algorithm 2 in multidimensional linear cryptanalysis. (English) Zbl 1279.94108

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 61-74 (2011).
MSC:  94A60 65T50 65T40
PDFBibTeX XMLCite
Full Text: DOI

Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. (English) Zbl 1214.94002

Lecture Notes in Computer Science 6639. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). viii, 295 p. (2011).
PDFBibTeX XMLCite
Full Text: DOI

Pushing the limits: a very compact and a threshold implementation of AES. (English) Zbl 1281.94044

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 69-88 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the convex hull click human identification protocol. (English) Zbl 1371.94621

Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25–28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 24-30 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Advanced meet-in-the-middle preimage attacks: first results on full Tiger, and improved results on MD4 and SHA-2. (English) Zbl 1253.94051

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 56-75 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

256 bit standardized crypto for 650 GE – GOST revisited. (English) Zbl 1297.94098

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 219-233 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new human identification protocol and Coppersmith’s baby-step giant-step algorithm. (English) Zbl 1350.94028

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 349-366 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Plaintext-awareness of hybrid encryption. (English) Zbl 1272.94037

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 57-72 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes. (English) Zbl 1234.94073

Parker, Matthew G. (ed.), Cryptography and coding. 12th IMA international conference, cryptography and coding 2009, Cirencester, UK, December 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10867-9/pbk). Lecture Notes in Computer Science 5921, 263-277 (2009).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI

Practical pseudo-collisions for hash functions ARIRANG-224/384. (English) Zbl 1267.94063

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 141-156 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the LAKE hash family. (English) Zbl 1248.94057

Dunkelman, Orr (ed.), Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22–25, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03316-2/pbk). Lecture Notes in Computer Science 5665, 156-179 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Coding and cryptology. Second international workshop, IWCC 2009, Zhangjiajie, China, June 1–5, 2009. Proceedings. (English) Zbl 1167.94001

Lecture Notes in Computer Science 5557. Berlin: Springer (ISBN 978-3-642-01813-8/pbk). viii, 275 p. (2009).
PDFBibTeX XMLCite
Full Text: DOI

Strongly multiplicative and 3-multiplicative linear secret sharing schemes. (English) Zbl 1172.94607

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 19-36 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Verifiable multi-secret sharing schemes for multiple threshold access structures. (English) Zbl 1166.94341

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 167-181 (2008).
MSC:  94A62 11A51
PDFBibTeX XMLCite
Full Text: DOI Link

Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. (English) Zbl 1362.94058

Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 178-195 (2008).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of short exponent RSA with primes sharing least significant bits. (English) Zbl 1362.94055

Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 49-63 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of Rabbit. (English) Zbl 1181.94100

Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 204-214 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of LASH. (English) Zbl 1154.68411

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 207-223 (2008).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. (English) Zbl 1155.94004

Series on Coding Theory and Cryptology 4. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). x, 277 p. (2008).
PDFBibTeX XMLCite

Efficient disjointness tests for private datasets. (English) Zbl 1279.94127

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 155-169 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the improvement of the BDF attack on LSBS-RSA. (English) Zbl 1279.94116

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 84-97 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new dynamic accumulator for batch updates. (English) Zbl 1285.94115

Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 98-112 (2008).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

On secure multi-party computation in black-box groups. (English) Zbl 1215.94042

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 591-612 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Combining prediction hashing and MDS codes for efficient multicast stream authentication. (English) Zbl 1213.94163

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 293-307 (2007).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

An hybrid approach for efficient multicast stream authentication over unsecured channels. (English) Zbl 1138.94385

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 17-34 (2007).
MSC:  94A62 90B18
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 6th international conference, CANS 2007, Singapore, December 8–10, 2007. Proceedings. (English) Zbl 1152.94304

Lecture Notes in Computer Science 4856. Berlin: Springer (ISBN 978-3-540-76968-2/pbk). xii, 283 p. (2007).
PDFBibTeX XMLCite
Full Text: DOI

Function fields over finite fields and their applications to cryptography. (English) Zbl 1130.11067

Garcia, Arnaldo (ed.) et al., Topics in geometry, coding theory and cryptography. Dordrecht: Springer (ISBN 1-4020-5333-9/hbk; 1-4020-5334-4/e-book). Algebra and Applications 6, 59-104 (2007).
PDFBibTeX XMLCite

Dynamic threshold and cheater resistance for Shamir secret sharing scheme. (English) Zbl 1172.94626

Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 103-117 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Achieving multicast stream authentication using MDS codes. (English) Zbl 1307.94123

Pointcheval, David (ed.) et al., Cryptology and network security. 5th international conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49462-1/pbk). Lecture Notes in Computer Science 4301, 108-125 (2006).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

A non-malleable group key exchange protocol robust against active insiders. (English) Zbl 1156.94410

Katsikas, Sokratis K. (ed.) et al., Information security. 9th international conference, ISC 2006, Samos Island, Greece, August 30–September 2, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38341-3/pbk). Lecture Notes in Computer Science 4176, 459-475 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the provable security of an efficient RSA-based pseudorandom generator. (English) Zbl 1172.94597

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 194-209 (2006).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

How to strengthen any weakly unforgeable signature into a strongly unforgeable signature. (English) Zbl 1177.94191

Abe, Masayuki (ed.), Topics in cryptology – CT-RSA 2007. The cryptographers’ track at the RSA conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-69327-7/pbk). Lecture Notes in Computer Science 4377, 357-371 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Anonymous signature schemes. (English) Zbl 1151.94587

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 347-363 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Higher order universal one-way hash functions from the subset sum assumption. (English) Zbl 1151.94572

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 157-173 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 4th international conference, CANS 2005, Xiamen, China, December 14–16, 2005. Proceedings. (English) Zbl 1098.94002

Lecture Notes in Computer Science 3810. Berlin: Springer (ISBN 3-540-30849-0/pbk). xi, 349 p. (2005).
PDFBibTeX XMLCite
Full Text: DOI

Radio networks with reliable communication. (English) Zbl 1128.68300

Wang, Lusheng (ed.), Computing and combinatorics. 11th annual international conference, COCOON 2005, Kunming, China, August 16–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28061-8/pbk). Lecture Notes in Computer Science 3595, 156-166 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Converse results to the Wiener attack on RSA. (English) Zbl 1081.94537

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 184-198 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. (English) Zbl 1198.94163

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 86-100 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Multiple-time signature schemes against adaptive chosen message attacks. (English) Zbl 1081.94553

Matsui, Mitsuru (ed.) et al., Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14–15, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21370-8/pbk). Lecture Notes in Computer Science 3006, 88-100 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Lattice-based threshold-changeability for standard Shamir secret-sharing schemes. (English) Zbl 1094.94039

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 170-186 (2004).
MSC:  94A62 11T71
PDFBibTeX XMLCite
Full Text: DOI

Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. (English) Zbl 1053.94002

Lecture Notes in Computer Science 3108. Berlin: Springer (ISBN 3-540-22379-7/pbk). xii, 494 p. (2004).
PDFBibTeX XMLCite
Full Text: DOI

Universal designated-verifier signatures. (English) Zbl 1205.94112

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 523-542 (2003).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient one-time proxy signatures. (English) Zbl 1205.94115

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 507-522 (2003).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Shared generation of pseudo-random functions with cumulative maps. (English) Zbl 1039.94521

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 281-294 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

A group key distribution scheme with decentralised user join. (English) Zbl 1022.68053

Cimato, Stelvio (ed.) et al., Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2576, 146-163 (2003).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

A dynamic group key distribution scheme with flexible user join. (English) Zbl 1031.94535

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 478-496 (2003).
PDFBibTeX XMLCite
Full Text: Link

A combinatorial approach to anonymous membership broadcast. (English) Zbl 1077.94521

Ibarra, Oscar H. (ed.) et al., Computing and combinatorics. 8th annual international conference, COCOON 2002, Singapore, August 15–17, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43996-X). Lect. Notes Comput. Sci. 2387, 162-170 (2002).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software