×

Found 59 Documents (Results 1–59)

Symmetric-key based proofs of retrievability supporting public verification. (English) Zbl 1499.68092

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 203-223 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Security model and analysis of FHMQV, revisited. (English) Zbl 1347.94048

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 255-269 (2014).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Pairing-based cryptography – Pairing 2013. 6th international conference, Beijing, China, November 22–24, 2013. Revised selected papers. (English) Zbl 1280.94006

Lecture Notes in Computer Science 8365. Berlin: Springer (ISBN 978-3-319-04872-7/pbk). x, 251 p. (2014).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

On the resistance of Boolean functions against fast algebraic attacks. (English) Zbl 1369.94530

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 261-274 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Oblivious transfer with complex attribute-based access control. (English) Zbl 1297.94112

Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 370-395 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Secure obfuscation of encrypted verifiable encrypted signatures. (English) Zbl 1298.94084

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 188-203 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Comments and improvements on key-exposure free chameleon hashing based on factoring. (English) Zbl 1295.94037

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 415-426 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Finding more Boolean functions with maximum algebraic immunity based on univariate polynomial representation. (English) Zbl 1279.94070

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 47-60 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On relationship of computational Diffie-Hellman problem and computational square-root exponent problem. (English) Zbl 1272.94069

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). Lecture Notes in Computer Science 6639, 283-293 (2011).
PDFBibTeX XMLCite
Full Text: DOI

Traitor tracing against public collaboration. (English) Zbl 1292.94175

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 302-316 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. (English) Zbl 1177.94016

Lecture Notes in Computer Science 5848. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). xii, 275 p. (2009).
PDFBibTeX XMLCite
Full Text: DOI

Generic security-amplifying methods of ordinary digital signatures. (English) Zbl 1319.94092

Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 224-241 (2008).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Efficient generic on-line/off-line signatures without key exposure. (English) Zbl 1214.94061

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 18-30 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Aggregate proxy signature and verifiably encrypted proxy signature. (English) Zbl 1138.94382

Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 208-217 (2007).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

A new signature scheme without random oracles from bilinear pairings. (English) Zbl 1295.94192

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 67-80 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient partially blind signatures with provable security. (English) Zbl 1171.94366

Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 345-354 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient provably secure restrictive partially blind signatures from bilinear pairings. (English) Zbl 1152.94409

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 251-265 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

An efficient static blind ring signature scheme. (English) Zbl 1185.94084

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 410-423 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Group signature where group manager, members and open authority are identity-based. (English) Zbl 1127.94376

Boyd, Colin (ed.) et al., Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26547-3/pbk). Lecture Notes in Computer Science 3574, 468-480 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Identity-based partial message recovery signatures (or how to shorten ID-based signatures). (English) Zbl 1120.94334

Patrick, Andrew S. (ed.) et al., Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 – March 3, 2005. Revised papers. Berlin: Springer (ISBN 3-540-26656-9/pbk). Lecture Notes in Computer Science 3570, 45-56 (2005).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

An efficient signature scheme from bilinear pairings and its applications. (English) Zbl 1198.94169

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 277-290 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

New ID-based threshold signature scheme from bilinear pairings. (English) Zbl 1113.94308

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 371-383 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Some new proxy signature schemes from pairings. (English) Zbl 1084.94521

Chen, Kefei (ed.), Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). The Kluwer International Series in Engineering and Computer Science 769, 59-66 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite

Identity-based strong designated verifier signature schemes. (English) Zbl 1098.94630

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 313-324 (2004).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Perfect concurrent signature schemes. (English) Zbl 1109.68487

Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 14-26 (2004).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Deniable partial proxy signatures. (English) Zbl 1115.94307

Maher, Michael J. (ed.), Advances in computer science – ASIAN 2004. Higher-level decision making. 9th Asian computing science conference. Dedicated to Jean-Louis Lassez on the occasion of his 5th cycle birthday, Chiang Mai, Thailand, December 8–10, 2004. Proceedings. Berlin: Springer (ISBN 3-540-24087-X/pbk). Lecture Notes in Computer Science 3321, 182-194 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Limited verifier signature from bilinear pairings. (English) Zbl 1103.68510

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 135-148 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. (English) Zbl 1123.94369

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 191-204 (2003).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient ID-based blind signature and proxy signature from bilinear pairings. (English) Zbl 1044.94548

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 312-323 (2003).
MSC:  94A62 15A63
PDFBibTeX XMLCite
Full Text: Link

Compact representation of domain parameters of hyperelliptic curve cryptosystems. (English) Zbl 1022.94510

Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 203-213 (2002).
PDFBibTeX XMLCite
Full Text: Link

ID-based blind signature and ring signature from pairings. (English) Zbl 1065.94566

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 533-547 (2002).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI

Fast scalar multiplication on the Jacobian of a family of hyperelliptic curves. (English) Zbl 1050.94541

Qing, Sihan (ed.) et al., Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13–16, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42880-1). Lect. Notes Comput. Sci. 2229, 74-83 (2001).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software