×

Found 61,622 Documents (Results 801–900)

Nonanticipative duality of sources and channels with memory and feedback. (English) Zbl 1404.94030

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 325-335 (2015).
MSC:  94A24 90B18
PDFBibTeX XMLCite
Full Text: DOI

Information nonanticipative rate distortion function and its applications. (English) Zbl 1404.94008

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 317-324 (2015).
MSC:  94A08 93A30
PDFBibTeX XMLCite
Full Text: DOI arXiv

Directed information on abstract spaces: properties and extremum problems. (English) Zbl 1404.94002

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 307-315 (2015).
MSC:  94A08 93E20
PDFBibTeX XMLCite
Full Text: DOI arXiv

On Shannon’s duality of a source and a channel and nonanticipative communication and communication for control. (English) Zbl 1404.94029

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 291-305 (2015).
MSC:  94A24 60J10
PDFBibTeX XMLCite
Full Text: DOI

What Is distributed control with direct communication between controllers? (English) Zbl 1403.93027

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 183-190 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Hard invalidation of electronic signatures. (English) Zbl 1403.94097

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 421-436 (2015).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

A new lattice-based threshold attribute-based signature scheme. (English) Zbl 1403.94101

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 406-420 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

New constructions of T-function. (English) Zbl 1403.94076

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 395-405 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully secure online/offline predicate and attribute-based encryption. (English) Zbl 1403.68057

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 331-345 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Revocable threshold attribute-based signature against signing key exposure. (English) Zbl 1403.94102

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 316-330 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption. (English) Zbl 1403.94066

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 301-315 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Adaptive-ID secure revocable identity-based encryption from lattices via subset difference method. (English) Zbl 1403.94050

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 283-297 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

User identity verification based on touchscreen interaction analysis in web contexts. (English) Zbl 1403.94085

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 268-282 (2015).
MSC:  94A60 68M11 68P25
PDFBibTeX XMLCite
Full Text: DOI

Half a century of practice: who Is still storing plaintext passwords? (English) Zbl 1403.94042

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 253-267 (2015).
MSC:  94A60 68M11 68P25
PDFBibTeX XMLCite
Full Text: DOI

Combined cache timing attacks and template attacks on stream cipher MUGI. (English) Zbl 1403.94054

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 235-249 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Estimating differential-linear distinguishers and applications to CTC2. (English) Zbl 1403.94060

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 220-234 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved differential analysis of block cipher PRIDE. (English) Zbl 1403.94088

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 209-219 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Batch blind signatures on elliptic curves. (English) Zbl 1403.94099

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 192-206 (2015).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI

Some elliptic subcovers of genus 3 hyperelliptic curves. (English) Zbl 1403.14064

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 181-191 (2015).
MSC:  14H52 14G50 94A60
PDFBibTeX XMLCite
Full Text: DOI

Models of curves from GHS attack in odd characteristic. (English) Zbl 1403.94084

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 171-180 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

sHMQV: an efficient key exchange protocol for power-limited devices. (English) Zbl 1403.94094

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 154-167 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly secure key exchange protocol with minimal KEM. (English) Zbl 1403.94082

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 139-153 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the effectiveness of different botnet detection approaches. (English) Zbl 1403.94061

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 121-135 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of fractional \(\omega\)mbNAF for scalar multiplication. (English) Zbl 1403.94068

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 109-120 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Partial prime factor exposure attacks on RSA and its Takagi’s variant. (English) Zbl 1403.94074

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 96-108 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cramer-Shoup like chosen ciphertext security from LPN. (English) Zbl 1403.94080

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 79-95 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New related key attacks on the RAKAPOSHI stream cipher. (English) Zbl 1403.94053

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 65-75 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fault attacks on stream cipher Scream. (English) Zbl 1403.94055

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 50-64 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential fault analysis of streebog. (English) Zbl 1403.94040

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 35-49 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security of the SM2 signature scheme against generalized key substitution attacks. (English) Zbl 1398.94188

Chen, Liqun (ed.) et al., Security standardisation research. Second international conference, SSR 2015, Tokyo, Japan, December 15–16, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27151-4/pbk; 978-3-319-27152-1/ebook). Lecture Notes in Computer Science 9497, 140-153 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous credential system with efficient proofs for monotone formulas on attributes. (English) Zbl 1398.94203

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 262-278 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. (English) Zbl 1398.68148

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 242-261 (2015).
MSC:  68P25 92D10 94A60
PDFBibTeX XMLCite
Full Text: DOI

\(k\)-anonymous microdata release via post randomisation method. (English) Zbl 1398.68138

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 225-241 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Almost optimum secret sharing schemes with cheating detection for random bit strings. (English) Zbl 1398.94196

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 213-222 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved efficiency of MP12. (English) Zbl 1398.94113

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 193-210 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully leakage-resilient non-malleable identification schemes in the bounded-retrieval model. (English) Zbl 1398.94186

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 153-172 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improvement of UC secure searchable symmetric encryption scheme. (English) Zbl 1398.68147

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 135-152 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

NM-CPA secure encryption with proofs of plaintext knowledge. (English) Zbl 1398.68146

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 115-134 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s. (English) Zbl 1398.94167

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 97-111 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved (pseudo) preimage attacks on reduced-round GOST and Grøstl-256 and studies on several truncation patterns for AES-like compression functions. (English) Zbl 1398.94140

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 79-96 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Implicit factorization of RSA moduli revisited (short paper). (English) Zbl 1398.94150

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 67-76 (2015).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: DOI

New fast algorithms for elliptic curve arithmetic in affine coordinates. (English) Zbl 1398.11158

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 56-64 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Invalid curve attacks in a GLS setting. (English) Zbl 1398.94127

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 41-55 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications. (English) Zbl 1397.94078

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 548-567 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient ephemeral elliptic curve cryptographic keys. (English) Zbl 1397.94091

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 524-547 (2015).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

On security of a white-box implementation of SHARK. (English) Zbl 1397.94098

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 455-471 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key recovery attacks against NTRU-based somewhat homomorphic encryption schemes. (English) Zbl 1397.94055

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 397-418 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hashing into Jacobi quartic curves. (English) Zbl 1397.94111

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 355-375 (2015).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

General circuit realizing compact revocable attribute-based encryption from multilinear maps. (English) Zbl 1397.94057

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 336-354 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

CCA secure PKE with auxiliary input security and leakage resiliency. (English) Zbl 1397.94107

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 319-335 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the provable security of the Dragonfly protocol. (English) Zbl 1397.94083

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 244-261 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

On the efficiency of multi-party contract signing protocols. (English) Zbl 1397.94059

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 227-243 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure and efficient private set intersection cardinality using Bloom filter. (English) Zbl 1397.94058

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 209-226 (2015).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Oblivious PAKE: efficient handling of password trials. (English) Zbl 1397.94080

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 191-208 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

From distinguishers to key recovery: improved related-key attacks on Even-Mansour. (English) Zbl 1397.94077

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 177-188 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic search for linear trails of the SPECK family. (English) Zbl 1397.94110

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 158-176 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis. (English) Zbl 1397.94099

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 141-157 (2015).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

Graded signatures. (English) Zbl 1397.94115

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 61-80 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Leveled strongly-unforgeable identity-based fully homomorphic signatures. (English) Zbl 1397.94106

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 42-60 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The generic transformation from standard signatures to identity-based aggregate signatures. (English) Zbl 1397.94085

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 21-41 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Black-box separations on Fiat-Shamir-type signatures in the non-programmable random oracle model. (English) Zbl 1397.94063

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 3-20 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software