×

Found 22 Documents (Results 1–22)

A modular approach to the incompressibility of block-cipher-based AEADs. (English) Zbl 1519.94133

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 585-619 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

IBE with incompressible master secret and small identity secrets. (English) Zbl 1519.94219

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 588-617 (2023).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Incompressible cryptography. (English) Zbl 1505.94071

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 700-730 (2022).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Incompressible encodings. (English) Zbl 1503.94020

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 494-523 (2020).
MSC:  94A29 94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience. (English) Zbl 1492.94175

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 666-690 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bounded-retrieval model with keys derived from private data. (English) Zbl 1404.94064

Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 273-290 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Balloon hashing: a memory-hard function providing provable protection against sequential attacks. (English) Zbl 1404.94043

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 220-248 (2016).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Big-key symmetric encryption: resisting key exfiltration. (English) Zbl 1379.94030

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 373-402 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient identification schemes from zero-knowledge proofs of storage. (English) Zbl 1338.94061

Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 311-328 (2015).
MSC:  94A60 68P20
PDFBibTeX XMLCite
Full Text: DOI

Mind your coins: fully leakage-resilient signatures with graceful degradation. (English) Zbl 1440.94049

Halldórsson, Magnús M. (ed.) et al., Automata, languages, and programming. 42nd international colloquium, ICALP 2015, Kyoto, Japan, July 6–10, 2015. Proceedings. Part I. Berlin: Springer. Lect. Notes Comput. Sci. 9134, 456-468 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

One-time programs with limited memory. (English) Zbl 1347.94031

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 377-394 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Leakage resilience of the Blom’s key distribution scheme. (English) Zbl 1395.94291

Padró, Carles (ed.), Information theoretic security. 7th international conference, ICITS 2013, Singapore, November 28–30, 2013. Proceedings. Cham: Springer (ISBN 978-3-319-04267-1/pbk; 978-3-319-04268-8/ebook). Lecture Notes in Computer Science 8317, 220-237 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Crypto galore! (English) Zbl 1358.94002

Bodlaender, Hans L. (ed.) et al., The multivariate algorithmic revolution and beyond. Essays dedicated to Michael R. Fellows on the occasion of his 60th birthday. Berlin: Springer (ISBN 978-3-642-30890-1/pbk). Lecture Notes in Computer Science 7370, 39-50 (2012).
PDFBibTeX XMLCite
Full Text: DOI

A lower bound on the key length of information-theoretic forward-secure storage schemes. (English) Zbl 1282.94043

Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 19-26 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient signatures. (English) Zbl 1274.94135

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 343-360 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A leakage-resilient mode of operation. (English) Zbl 1239.94062

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 462-482 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software