×

Found 163 Documents (Results 1–100)

Hard invalidation of electronic signatures. (English) Zbl 1403.94097

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 421-436 (2015).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

End-to-end design of a PUF-based privacy preserving authentication protocol. (English) Zbl 1380.94136

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 556-576 (2015).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Compactly hiding linear spans. Tightly secure constant-size simulation-sound QA-NIZK proofs and applications. (English) Zbl 1380.94112

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 681-707 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Short group signatures via structure-preserving signatures: standard model security from simple assumptions. (English) Zbl 1352.94048

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 296-316 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Secure efficient history-hiding append-only signatures in the standard model. (English) Zbl 1345.94074

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 450-473 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. (English) Zbl 1319.94006

Lecture Notes in Computer Science 8957. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). xiii, 547 p. (2015).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

A little honesty goes a long way. The two-tier model for secure multiparty computation. (English) Zbl 1354.94029

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 134-158 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Born and raised distributively, fully distributed non-interactive adaptively-secure threshold signatures with short shares. (English) Zbl 1321.94077

Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 303-312 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. (English) Zbl 1319.94005

Lecture Notes in Computer Science 8567. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). xiii, 408 p. (2014).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Order-preserving encryption secure beyond one-wayness. (English) Zbl 1317.94136

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 42-61 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concise multi-challenge CCA-secure encryption and signatures with almost tight security. (English) Zbl 1311.94107

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 1-21 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Narrow bandwidth is not inherent in reverse public-key encryption. (English) Zbl 1378.94057

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 598-607 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-malleability from malleability: simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures. (English) Zbl 1300.94111

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 514-532 (2014).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Traceable group encryption. (English) Zbl 1300.94079

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 592-610 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Resource-based corruptions and the combinatorics of hidden diversity. (English) Zbl 1364.94537

Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 415-428 (2013).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Sequential aggregate signatures made shorter. (English) Zbl 1330.94057

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 202-217 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Self-updatable encryption: time constrained access control with hidden attributes and better efficiency. (English) Zbl 1327.94064

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 235-254 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linearly homomorphic structure-preserving signatures and their applications. (English) Zbl 1296.94154

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 289-307 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. (English) Zbl 1263.94006

Lecture Notes in Computer Science 7763. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). xii, 393 p. (2013).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Sequential aggregate signatures with short public keys: design, analysis and implementation studies. (English) Zbl 1290.94153

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 423-442 (2013).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Strictly-black-box zero-knowledge and efficient validation of financial transactions. (English) Zbl 1272.68124

Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Warwick, UK, July 9–13, 2012. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-31593-0/pbk). Lecture Notes in Computer Science 7391, 738-749 (2012).
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure forward-secure non-interactive threshold cryptosystems. (English) Zbl 1292.94101

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 1-21 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. (English) Zbl 1253.94006

Lecture Notes in Computer Science 7537. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). ix, 394 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

On the centrality of off-line e-cash to concrete partial information games. (English) Zbl 1365.68238

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 264-280 (2012).
PDFBibTeX XMLCite
Full Text: DOI

Group signatures with almost-for-free revocation. (English) Zbl 1296.94156

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 571-589 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Multi-location leakage resilient cryptography. (English) Zbl 1300.94071

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 504-521 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Trusted systems. Third international conference, INTRUST 2011, Beijing, China, November 27–29, 2011. Revised selected papers. (English) Zbl 1284.68009

Lecture Notes in Computer Science 7222. Berlin: Springer (ISBN 978-3-642-32297-6/pbk). xii, 351 p. (2012).
PDFBibTeX XMLCite
Full Text: DOI

Scalable group signatures with revocation. (English) Zbl 1296.94155

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 609-627 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions. (English) Zbl 1303.94089

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 75-93 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully forward-secure group signatures. (English) Zbl 1300.94112

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 156-184 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Resettable cryptography in constant rounds – the case of zero knowledge. (English) Zbl 1227.94041

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 390-406 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. (English) Zbl 1218.94005

Lecture Notes in Computer Science 6584. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). xiv, 524 p. (2011).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

On the security of hash functions employing blockcipher postprocessing. (English) Zbl 1282.94036

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 146-166 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure non-interactive threshold cryptosystems. (English) Zbl 1334.94085

Aceto, Luca (ed.) et al., Automata, languages and programming. 38th international colloquium, ICALP 2011, Zurich, Switzerland, July 4–8, 2011. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-22011-1/pbk). Lecture Notes in Computer Science 6756, 588-600 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient circuit-size independent public key encryption with KDM security. (English) Zbl 1290.94108

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 507-526 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Signatures resilient to continual leakage on memory and computation. (English) Zbl 1295.94185

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 89-106 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. (English) Zbl 1200.94007

Lecture Notes in Computer Science 6151. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). xiii, 460 p. (2010).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

A new framework for RFID privacy. (English) Zbl 1404.94063

Gritzalis, Dimitris (ed.) et al., Computer security – ESORICS 2010. 15th European symposium on research in computer security, Athens, Greece, September 20–22, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15496-6/pbk). Lecture Notes in Computer Science 6345, 1-18 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Kleptography from standard assumptions and applications. (English) Zbl 1291.94172

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 271-290 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concurrent knowledge extraction in the public-key model. (English) Zbl 1288.94086

Abramsky, Samson (ed.) et al., Automata, languages and programming. 37th international colloquium, ICALP 2010, Bordeaux, France, July 6–10, 2010. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-14164-5/pbk). Lecture Notes in Computer Science 6198, 702-714 (2010).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Efficient completely non-malleable public key encryption. (English) Zbl 1287.94082

Abramsky, Samson (ed.) et al., Automata, languages and programming. 37th international colloquium, ICALP 2010, Bordeaux, France, July 6–10, 2010. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-14164-5/pbk). Lecture Notes in Computer Science 6198, 127-139 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. (English) Zbl 1190.94005

Lecture Notes in Computer Science 6123. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). xiii, 564 p. (2010).
PDFBibTeX XMLCite
Full Text: DOI

Cryptography between wonderland and underland. (English) Zbl 1280.94100

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 320-321 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concise mercurial vector commitments and independent zero-knowledge sets with short proofs. (English) Zbl 1274.94093

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 499-517 (2010).
MSC:  94A60 68P15
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation minimizing online rounds. (English) Zbl 1267.94054

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 268-286 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Group encryption: non-interactive realization in the standard model. (English) Zbl 1267.94049

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 179-196 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. (English) Zbl 1172.68310

Lecture Notes in Computer Science 5735. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). xiv, 508 p. (2009).
PDFBibTeX XMLCite
Full Text: DOI

Efficient traceable signatures in the standard model. (English) Zbl 1248.94108

Shacham, Hovav (ed.) et al., Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03297-4/pbk). Lecture Notes in Computer Science 5671, 187-205 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure function collection with sublinear storage. (English) Zbl 1248.94072

Albers, Susanne (ed.) et al., Automata, languages and programming. 36th international colloquium, ICALP 2009, Rhodes, Greece, July 5–12, 2009. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-02929-5/pbk). Lecture Notes in Computer Science 5556, 534-545 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new randomness extraction paradigm for hybrid encryption. (English) Zbl 1239.94055

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 590-609 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A unified framework for the analysis of side-channel key recovery attacks. (English) Zbl 1239.94066

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 443-461 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the portability of generalized Schnorr proofs. (English) Zbl 1239.94039

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 425-442 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constructing variable-length PRPs and SPRPs from fixed-length PRPs. (English) Zbl 1237.94057

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 157-180 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI DOI

Key evolution systems in untrusted update environments. (English) Zbl 1237.94112

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 12-21 (2009).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. (English) Zbl 1160.94004

Lecture Notes in Computer Science 5487. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). xiii, 439 p. (2009).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Fair traceable multi-group signatures. (English) Zbl 1175.94104

Tsudik, Gene (ed.), Financial cryptography and data security. 12th international conference, FC 2008, Cozumel, Mexico, January 28–31, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-85229-2/pbk). Lecture Notes in Computer Science 5143, 231-246 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A timing-resistant elliptic curve backdoor in RSA. (English) Zbl 1166.94328

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 427-441 (2008).
MSC:  94A60 11G07
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. (English) Zbl 1155.94007

Lecture Notes in Computer Science 4990. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). xii, 534 p. (2008).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Privacy preserving data mining within anonymous credential systems. (English) Zbl 1180.68151

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 57-76 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Methods for linear and differential cryptanalysis of elastic block ciphers. (English) Zbl 1279.94068

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 187-202 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. (English) Zbl 1137.94301

Lecture Notes in Computer Science 5037. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). xi, 508 p. (2008).
PDFBibTeX XMLCite
Full Text: DOI

\(K\)-anonymous multi-party secret handshakes. (English) Zbl 1195.94077

Dietrich, Sven (ed.) et al., Financial cryptography and data security. 11th international conference, FC 2007, and 1st international workshop on usable security, USEC 2007, Scarborough, Trinidad and Tobago, February 12–16, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77365-8/pbk). Lecture Notes in Computer Science 4886, 72-87 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Recovering NTRU secret key from inversion oracles. (English) Zbl 1162.94393

Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 18-36 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Preimage attack on the parallel FFT-Hashing function. (English) Zbl 1213.94090

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 59-67 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The security of elastic block ciphers against key-recovery attacks. (English) Zbl 1138.94358

Garay, Juan A. (ed.) et al., Information security. 10th international conference, ISC 2007, Valparaíso, Chile, October 9–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75495-4/pbk). Lecture Notes in Computer Science 4779, 89-103 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Two-party computing with encrypted data. (English) Zbl 1153.94360

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 298-314 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Group encryption. (English) Zbl 1153.94399

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 181-199 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Secret Swarm Unit reactive \(k\)-secret sharing (extended abstract). (English) Zbl 1153.94454

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 123-137 (2007).
MSC:  94A62 68M14
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. (English) Zbl 1135.94002

Lecture Notes in Computer Science 4859. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). xi, 426 p. (2007).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Generic and practical resettable zero-knowledge in the bare public-key model. (English) Zbl 1141.94382

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 129-147 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. (English) Zbl 1121.94002

Lecture Notes in Computer Science 4521. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). xiii, 498 p. (2007).
PDFBibTeX XMLCite
Full Text: DOI

Parallel key-insulated public key encryption without random oracles. (English) Zbl 1161.94415

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 298-314 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient intrusion-resilient signatures without random oracles. (English) Zbl 1172.94621

Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 27-41 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. (English) Zbl 1151.94004

Lecture Notes in Computer Science 4318. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). xi, 305 p. (2006).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. (English) Zbl 1146.68007

Lecture Notes in Computer Science 4116. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). xi, 366 p. (2006).
PDFBibTeX XMLCite
Full Text: DOI

Efficient cryptographic protocols realizing e-markets with price discrimination. (English) Zbl 1152.94426

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 311-325 (2006).
MSC:  94A60 91B24
PDFBibTeX XMLCite
Full Text: DOI

Indifferentiable security analysis of popular hash functions with prefix-free padding. (English) Zbl 1172.94567

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 283-298 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A space efficient backdoor in RSA and its applications. (English) Zbl 1151.94591

Preneel, Bart (ed.) et al., Selected areas in cryptography. 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005. Revised selected papers. Berlin: Springer (ISBN 978-3-540-33108-7/pbk). Lecture Notes in Computer Science 3897, 128-143 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Threshold and proactive pseudo-random permutations. (English) Zbl 1113.65006

Halevi, Shai (ed.) et al., Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Berlin: Springer (ISBN 3-540-32731-2/pbk). Lecture Notes in Computer Science 3876, 542-560 (2006).
MSC:  65C10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Interactive zero-knowledge with restricted random oracles. (English) Zbl 1112.94022

Halevi, Shai (ed.) et al., Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Berlin: Springer (ISBN 3-540-32731-2/pbk). Lecture Notes in Computer Science 3876, 21-40 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. (English) Zbl 1102.94003

Lecture Notes in Computer Science 3958. Berlin: Springer (ISBN 3-540-33851-9/pbk). xiv, 543 p. (2006).
PDFBibTeX XMLCite
Full Text: DOI

Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. (English) Zbl 1102.94004

Lecture Notes in Computer Science 3989. Berlin: Springer (ISBN 3-540-34703-8/pbk). xiv, 488 p. (2006).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Group signatures with efficient concurrent join. (English) Zbl 1137.94373

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 198-214 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software