×

Found 122 Documents (Results 1–100)

Attribute based tracing for securing group signatures against centralized authorities. (English) Zbl 07722523

Su, Chunhua (ed.) et al., Information security practice and experience. 17th international conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13620, 554-572 (2022).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Theory and application of computationally-independent one-way functions: interactive proof of ability – revisited. (English) Zbl 07388839

Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 97-109 (2021).
MSC:  65-XX
PDFBibTeX XMLCite
Full Text: DOI

Visual secret sharing scheme with distributed levels of importance of shadows. (English) Zbl 07388834

Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 19-32 (2021).
MSC:  68-XX
PDFBibTeX XMLCite
Full Text: DOI

Hierarchical secret sharing schemes secure against rushing adversary: cheater identification and robustness. (English) Zbl 1518.94122

Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 578-594 (2018).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Analysis of variance of graph-clique mining for scalable proof of work. (English) Zbl 1477.94066

Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11449, 101-114 (2018).
MSC:  94A62 05C90 68R10
PDFBibTeX XMLCite
Full Text: DOI Link

Mathematics and computing. 4th international conference, ICMC 2018, Varanasi, India, January 9–11, 2018. Revised selected papers. (English) Zbl 1411.65006

Communications in Computer and Information Science 834. Singapore: Springer (ISBN 978-981-13-0022-6/pbk; 978-981-13-0023-3/ebook). xix, 325 p. (2018).
PDFBibTeX XMLCite
Full Text: DOI

Mathematics and computing. ICMC 2018, Varanasi, India, January 9–11, 2018. Selected contributions from the 4th international conference. (English) Zbl 1402.65008

Springer Proceedings in Mathematics & Statistics 253. Singapore: Springer (ISBN 978-981-13-2094-1/hbk; 978-981-13-2095-8/ebook). xvii, 470 p. (2018).
MSC:  65-06 68-06 00B25
PDFBibTeX XMLCite
Full Text: DOI

IMI workshop of the joint research projects on secret sharing for dependability, usability and security of network storage and its mathematical modeling, Fukuoka, Japan, September 5–7, 2016. (English) Zbl 1367.68003

MI Lecture Note 73. Fukuoka: Kyushu University, Institute of Mathematics for Industry and Graduate School of Mathematics. xii, 211 p. (2017).
PDFBibTeX XMLCite

Yet another note on block withholding attack on bitcoin mining pools. (English) Zbl 1397.94046

Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 167-180 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient threshold secret sharing schemes secure against rushing cheaters. (English) Zbl 1407.94166

Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 3-23 (2016).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the application of clique problem for proof-of-work in cryptocurrencies. (English) Zbl 1409.94861

Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 260-279 (2016).
MSC:  94A60 05C90
PDFBibTeX XMLCite
Full Text: DOI

Attribute-based two-tier signatures: definition and construction. (English) Zbl 1384.94025

Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 36-49 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A multivariate encryption scheme with Rainbow. (English) Zbl 1384.94109

Qing, Sihan (ed.) et al., Information and communications security. 17th international conference, ICICS 2015, Beijing, China, December 9–11, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-29813-9/pbk; 978-3-319-29814-6/ebook). Lecture Notes in Computer Science 9543, 236-251 (2016).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

CCA-secure keyed-fully homomorphic encryption. (English) Zbl 1388.94067

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 70-98 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU. (English) Zbl 1327.94076

Mohapatra, Ram N. (ed.) et al., Mathematics and computing. Selected papers based on the presentations at the 2nd international conference, ICMC, Haldia, India, January 5–10, 2015. New Delhi: Springer (ISBN 978-81-322-2451-8/hbk; 978-81-322-2452-5/ebook). Springer Proceedings in Mathematics & Statistics 139, 349-361 (2015).
MSC:  94A60 68W30 11T71
PDFBibTeX XMLCite
Full Text: DOI

Security model and analysis of FHMQV, revisited. (English) Zbl 1347.94048

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 255-269 (2014).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Fine-grained conditional proxy re-encryption and application. (English) Zbl 1368.94134

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 206-222 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Workshop on algebraic constructions as a fundamental keystone of a safe and secure society. Mathematics for guaranteeing the reliability of the cyber-society, Kyushu University, Fukuoka, Japan, August 26–30, 2013. (English, Japanese) Zbl 1296.00027

MI Lecture Note 53. Fukuoka: Kyushu University, Institute of Mathematics for Industry and Graduate School of Mathematics. xii, 158 p. (2013).
MSC:  00A69 65-06 65Z99
PDFBibTeX XMLCite
Full Text: Link

Multivariate signature scheme using quadratic forms. (English) Zbl 1306.94098

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 243-258 (2013).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Application of scalar multiplication of Edwards curves to pairing-based cryptography. (English) Zbl 1292.94158

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 19-36 (2012).
MSC:  94A60 14H45 14G50
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of randomized arithmetic codes based on Markov model. (English) Zbl 1292.94164

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 341-362 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure keyword search using Bloom filter with specified character positions. (English) Zbl 1304.68044

Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 235-252 (2012).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-user keyword search scheme for secure data sharing with fine-grained access control. (English) Zbl 1365.94473

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 406-418 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Reducing the key size of rainbow using non-commutative rings. (English) Zbl 1292.94157

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 68-83 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A security analysis of uniformly-layered Rainbow. Revisiting Sato-Araki’s non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm. (English) Zbl 1290.94159

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 275-294 (2011).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

General fault attacks on multivariate public key cryptosystems. (English) Zbl 1290.94084

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 1-18 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. (English) Zbl 1325.68086

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 83-97 (2011).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Communication and networking. International conference, FGCN 2010, held as part of the future generation information technology conference, FGIT 2010, Jeju Island, Korea, December 13–15, 2010. Proceedings, Part II. (English) Zbl 1207.68009

Communications in Computer and Information Science 120. Berlin: Springer (ISBN 978-3-642-17603-6/pbk; 978-3-642-17604-3/ebook). xvii, 471 p. (2010).
PDFBibTeX XMLCite
Full Text: DOI

Adaptive and composable non-committing encryptions. (English) Zbl 1323.94146

Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 135-144 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Reconsidering data logging in light of digital forensics. (English) Zbl 1209.68076

Park, Jong Hyuk (ed.) et al., Advances in information security and its application. Third international conference, ISA 2009, Seoul, Korea, June 25–27, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02632-4/pbk; 978-3-642-02633-1/ebook). Communications in Computer and Information Science 36, 111-118 (2009).
MSC:  68M99 68M11
PDFBibTeX XMLCite
Full Text: DOI

Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks. (English) Zbl 1211.68022

Park, Jong Hyuk (ed.) et al., Advances in information security and its application. Third international conference, ISA 2009, Seoul, Korea, June 25–27, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02632-4/pbk; 978-3-642-02633-1/ebook). Communications in Computer and Information Science 36, 105-110 (2009).
MSC:  68M11 68N99
PDFBibTeX XMLCite
Full Text: DOI

Communication and networking. International conference, FGCN/ACN 2009, held as part of the future generation information technology conference, FGIT 2009, Jeju Island, Korea, December 10–12, 2009. Proceedings. (English) Zbl 1183.68059

Communications in Computer and Information Science 56. Berlin: Springer (ISBN 978-3-642-10843-3/pbk; 978-3-642-10844-0/ebook). xvii, 647 p. (2009).
PDFBibTeX XMLCite
Full Text: DOI

Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network. (English) Zbl 1197.68021

Cai, Jin-Yi (ed.) et al., Theory and applications of models of computation. 4th international conference, TAMC 2007, Shanghai, China, May 22–25, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72503-9/pbk). Lecture Notes in Computer Science 4484, 362-373 (2007).
MSC:  68M10
PDFBibTeX XMLCite
Full Text: DOI

A note on the (im)possibility of using obfuscators to transform private-key encryption into public-key encryption. (English) Zbl 1391.94756

Miyaji, Atsuko (ed.) et al., Advances in information and computer security. Second international workshop on security, IWSEC 2007, Nara, Japan, October 29–31, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75650-7/pbk). Lecture Notes in Computer Science 4752, 1-12 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in information and computer security. First international workshop on security, IWSEC 2006, Kyoto, Japan, October 23–24, 2006. Proceedings. (English) Zbl 1151.68311

Lecture Notes in Computer Science 4266. Berlin: Springer (ISBN 978-3-540-47699-3/pbk). xiii, 438 p. (2006).
PDFBibTeX XMLCite
Full Text: DOI

Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic. (English) Zbl 1272.94082

Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 79-94 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: Link

On the pseudorandomness of a modification of KASUMI type permutations. (English) Zbl 1133.94326

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 313-329 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simple power analysis on fast modular reduction with NIST recommended elliptic curves. (English) Zbl 1122.94401

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 169-180 (2005).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Generic, optimistic, and efficient schemes for fair certified email delivery. (English) Zbl 1122.94439

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 40-52 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

An evenhanded certified email system for contract signing. (English) Zbl 1122.94421

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 1-13 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of a 2/3-rate double length compression function in the black-box model. (English) Zbl 1140.94364

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 243-254 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A distributed online certificate status protocol with a single public key. (English) Zbl 1198.94154

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 389-401 (2004).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On security of XTR public key cryptosystems against side channel attacks. (English) Zbl 1098.94614

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 454-465 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A generalization of PGV-hash functions and security analysis in black-box model. (English) Zbl 1098.94622

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 212-223 (2004).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A new attack with side channel leakage during exponent recoding computations. (English) Zbl 1104.68495

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 298-311 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Modified power-analysis attacks on XTR and an efficient countermeasure. (English) Zbl 1109.94346

Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 305-317 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Timing attack against implementation of a parallel algorithm for modular exponentiation. (English) Zbl 1131.68455

Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 319-330 (2003).
MSC:  68P25 68M07 94A60
PDFBibTeX XMLCite
Full Text: DOI

Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. (English) Zbl 1131.94327

Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 265-279 (2003).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Single-path authenticated-encryption scheme based on universal hashing. (English) Zbl 1027.68597

Nyberg, Kaisa (ed.) et al., Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15-16, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2595, 94-109 (2003).
MSC:  68P25 94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

A reject timing attack on an IND-CCA2 public-key cryptosystem. (English) Zbl 1031.94526

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 359-373 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

New semantically secure public-key cryptosystems from the RSA-primitive. (English) Zbl 1055.94530

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 1-16 (2002).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: Link

Risks with raw-key masking – the security evaluation of 2-key XCBC. (English) Zbl 1023.94524

Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 327-341 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using Montgomery trick. (English) Zbl 1028.94025

Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 564-578 (2002).
PDFBibTeX XMLCite
Full Text: Link

A certified e-mail system with receiver’s selective usage of delivery authority. (English) Zbl 1033.94559

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 326-338 (2002).
MSC:  94A62 68U35
PDFBibTeX XMLCite
Full Text: Link

On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling. (English) Zbl 1024.94512

Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 420-435 (2002).
MSC:  94A60 68P25 14G50
PDFBibTeX XMLCite
Full Text: Link

Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint Hamming weight representation of scalars. (English) Zbl 1019.68577

Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 484-499 (2002).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

A second-order DPA attack breaks a window-method based countermeasure against side channel attacks. (English) Zbl 1019.68574

Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 389-401 (2002).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks. (English) Zbl 0999.94541

Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 428-439 (2002).
PDFBibTeX XMLCite

Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring. (English) Zbl 0999.94529

Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 81-102 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite

On the power of multidoubling in speeding up elliptic scalar multiplication. (English) Zbl 1067.94560

Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 268-283 (2001).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: Link

Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the \(y\)-coordinate on a Montgomery-form elliptic curve. (English) Zbl 1012.94551

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 126-141 (2001).
MSC:  94A60 14G50 68P25
PDFBibTeX XMLCite
Full Text: Link

On zero-knowledge proofs: “from membership to decision” (extended abstract). (English) Zbl 1296.68077

Proceedings of the thirty-second annual ACM symposium on theory of computing (STOC 2000), Portland, Oregon, USA, May 21–23, 2000. New York, NY: ACM Press (ISBN 1-58113-184-4). 255-264 (2000).
MSC:  68Q25 94A60
PDFBibTeX XMLCite
Full Text: DOI

An anonymous electronic bidding protocol based on a new convertible group signature scheme. On the importance of hiding the winner’s identity against bid-rigging. (English) Zbl 0963.94519

Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 385-399 (2000).
MSC:  94A62
PDFBibTeX XMLCite

Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance. (English) Zbl 0963.94017

Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 59-73 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. (English) Zbl 0963.94026

Roy, Bimal (ed.) et al., Progress in cryptology - INDOCRYPT 2000. 1st international conference in cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1977, 178-190 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Efficient algorithms for the Jacobian variety of hyperelliptic curves \(y^2=x^p-x+1\) over a finite field of odd characteristic \(p\). (English) Zbl 1009.11047

Buchmann, Johannes (ed.) et al., Coding theory, cryptography and related areas. Proceedings of an international conference, Guanajuato, Mexico, April 1998. Berlin: Springer. 73-89 (2000).
MSC:  11G20 11T71 94A60
PDFBibTeX XMLCite

Making hash functions from block ciphers secure and efficient by using convolutional codes. (English) Zbl 0969.94017

Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 391-404 (2000).
MSC:  94A60 68P25 94B10
PDFBibTeX XMLCite

Elliptic curves with the Montgomery-form and their cryptographic applications. (English) Zbl 0969.94021

Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 238-257 (2000).
PDFBibTeX XMLCite

A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems. (English) Zbl 1032.94527

Song, JooSeok (ed.), Information security and cryptology - ICISC ’99. 2nd international conference, Seoul, Korea, December 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1787, 221-235 (1999).
MSC:  94A60
PDFBibTeX XMLCite

Over \(F_p\) vs. over \(F_{2^n}\) and on Pentium vs. on Alpha in software implementation of hyperelliptic curve cryptosystems. (English) Zbl 1032.94525

Song, JooSeok (ed.), Information security and cryptology - ICISC ’99. 2nd international conference, Seoul, Korea, December 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1787, 82-101 (1999).
MSC:  94A60
PDFBibTeX XMLCite

Toward fair international key escrow – an attempt by distributed trusted third agencies with threshold cryptography. (English) Zbl 0929.94007

Imai, Hideki (ed.) et al., Public key cryptography. 2nd international workshop on Practice and theory in public key cryptography, PKC ’99. Kamakura, Japan, March 1–3, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1560, 171-187 (1999).
MSC:  94A60
PDFBibTeX XMLCite

A key escrow system with protecting user’s privacy by blind decoding. (English) Zbl 0930.94032

Okamoto, Eiji (ed.) et al., Information security. 1st international workshop, ISW ’97, Tatsunokuchi, Ishikawa, Japan, September 17–19, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1396, 147-157 (1998).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Design of hyperelliptic cryptosystems in small characteristic and a software implementation over \(F_{2^n}\). (English) Zbl 1058.94523

Ohta, Kazuo (ed.) et al., Advances in cryptology - ASIACRYPT ’98. International conference on the Theory and application of cryptology and information security, Beijing, China, October 18–22, 1998. Proceedings. Berlin: Springer (ISBN 3-540-65109-8). Lect. Notes Comput. Sci. 1514, 80-94 (1998).
MSC:  94A60 11Y16
PDFBibTeX XMLCite

Security issues for contactless smart cards. (English) Zbl 1067.94527

Imai, Hideki (ed.) et al., Public key cryptography. 1st international workshop on practice and theory in public key cryptography, PKC ’98, Pacifico Yokohama, Japan, February 5–6, 1998. Proceedings. Berlin: Springer (ISBN 3-540-64693-0). Lect. Notes Comput. Sci. 1431, 247-252 (1998).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Secure hyperelliptic cryptosystems and their performance. (English) Zbl 1067.94561

Imai, Hideki (ed.) et al., Public key cryptography. 1st international workshop on practice and theory in public key cryptography, PKC ’98, Pacifico Yokohama, Japan, February 5–6, 1998. Proceedings. Berlin: Springer (ISBN 3-540-64693-0). Lect. Notes Comput. Sci. 1431, 164-181 (1998).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

Result-indistinguishable zero-knowledge proofs: Increased power and constant-round protocols. (English) Zbl 0903.94028

Morvan, Michel (ed.) et al., STACS 98. 15th annual symposium on Theoretical aspects of computer science. Paris, France, February 25–27, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1373, 511-521 (1998).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Improving linear cryptanalysis of LOKI91 by probabilistic counting method. (English) Zbl 1385.94069

Biham, Eli (ed.), Fast software encryption. 4th international workshop, FSE ’97, Haifa, Israel, January 20–22, 1997. Proceedings. Berlin: Springer (ISBN 3-540-63247-6). Lect. Notes Comput. Sci. 1267, 114-133 (1997).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software