×

Found 167 Documents (Results 1–100)

New design techniques for efficient arithmetization-oriented hash functions: Anemoi permutations and Jive compression mode. (English) Zbl 07799266

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 507-539 (2023).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Twin column parity mixers and Gaston. A new mixing layer and permutation. (English) Zbl 1531.94048

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 475-506 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Combined fault and leakage resilience: composability, constructions and compiler. (English) Zbl 07799262

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 377-409 (2023).
MSC:  68N20 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Randomized half-ideal cipher on groups with applications to UC (a)PAKE. (English) Zbl 1528.94045

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 128-156 (2023).
MSC:  94A60 05A05
PDFBibTeX XMLCite
Full Text: DOI

Pitfalls and shortcomings for decompositions and alignment. (English) Zbl 1528.94064

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 318-347 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

From Farfalle to Megafono via Ciminion: the PRF Hydra for MPC applications. (English) Zbl 1528.94055

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 255-286 (2023).
MSC:  94A60 68P25 68M14
PDFBibTeX XMLCite
Full Text: DOI

Collision attacks on round-reduced SHA-3 using conditional internal differentials. (English) Zbl 1528.94088

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 220-251 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle preimage attacks on sponge-based hashing. (English) Zbl 1528.94074

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 158-188 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms. (English) Zbl 07745599

Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 3-28 (2023).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3. (English) Zbl 1530.81054

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13793, 645-674 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Security of truncated permutation without initial value. (English) Zbl 1519.94127

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 620-650 (2023).
MSC:  94A60 05A05
PDFBibTeX XMLCite
Full Text: DOI

Hybrid scalar/vector implementations of Keccak and SPHINCS\textsuperscript{+} on AArch64. (English) Zbl 07726568

Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 272-293 (2023).
MSC:  68P25 81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI

ISAP+: ISAP with fast authentication. (English) Zbl 1519.94055

Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 195-219 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Systematic study of decryption and re-encryption leakage: the case of Kyber. (English) Zbl 1528.94030

Balasch, Josep (ed.) et al., Constructive side-channel analysis and secure design. 13th international workshop, COSADE 2022, Leuven, Belgium, April 11–12, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13211, 236-256 (2022).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Efficient lattice-based inner-product functional encryption. (English) Zbl 1519.94049

Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13178, 163-193 (2022).
MSC:  94A60 68P25 68N20
PDFBibTeX XMLCite
Full Text: DOI Link

Higher-order masked Saber. (English) Zbl 1518.94076

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 13th International conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13409, 93-116 (2022).
PDFBibTeX XMLCite
Full Text: DOI

Tight preimage resistance of the sponge construction. (English) Zbl 07708474

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13510, 185-204 (2022).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Triangulating rebound attack on AES-like hashing. (English) Zbl 1516.94028

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 94-124 (2022).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

On the linear components space of S-boxes generated by orthogonal cellular automata. (English) Zbl 1521.94056

Chopard, Bastien (ed.) et al., Cellular automata. 15th international conference on cellular automata for research and industry, ACRI 2022, Geneva, Switzerland, September 12–15, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13402, 52-62 (2022).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Preimage attacks on 4-round Keccak by solving multivariate quadratic systems. (English) Zbl 07628050

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 195-216 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

CArrency: an energy-efficient proof-of-work scheme for crypto-currencies. (English) Zbl 1498.94082

Giri, Debasis (ed.) et al., Proceedings of the seventh international conference on mathematics and computing, ICMC 2021, Shibpur, India, March 2–5, 2021. Singapore: Springer. Adv. Intell. Syst. Comput. 1412, 23-38 (2022).
MSC:  94A60 91B99 68Q80
PDFBibTeX XMLCite
Full Text: DOI

Asymmetric PAKE with low computation and communication. (English) Zbl 1497.94138

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13276, 127-156 (2022).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

A lightweight implementation of Saber resistant against side-channel attacks. (English) Zbl 1522.81067

Adhikari, Avishek (ed.) et al., Progress in cryptology – INDOCRYPT 2021. 22nd International conference on cryptology in India, Jaipur, India, December 12–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13143, 224-245 (2021).
PDFBibTeX XMLCite
Full Text: DOI

Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes. (English) Zbl 1514.94116

Adhikari, Avishek (ed.) et al., Progress in cryptology – INDOCRYPT 2021. 22nd International conference on cryptology in India, Jaipur, India, December 12–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13143, 159-178 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks. (English) Zbl 1514.94128

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13091, 62-94 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure and efficient software masking on superscalar pipelined processors. (English) Zbl 07684775

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13091, 3-32 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic attacks on Rasta and Dasta using low-degree equations. (English) Zbl 1514.94115

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 214-240 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A template attack to reconstruct the input of SHA-3 on an 8-bit device. (English) Zbl 1504.94198

Bertoni, Guido Marco (ed.) et al., Constructive side-channel analysis and secure design. 11th international workshop, COSADE 2020, Lugano, Switzerland, April 1–3, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12244, 25-42 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Security analysis of deterministic re-keying with masking and shuffling: application to ISAP. (English) Zbl 1491.94069

Bhasin, Shivam (ed.) et al., Constructive side-channel analysis and secure design. 12th international workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12910, 168-183 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates. (English) Zbl 1489.68418

Longa, Patrick (ed.) et al., Progress in cryptology – LATINCRYPT 2021. 7th international conference on cryptology and information security in Latin America, Bogotá, Colombia, October 6–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12912, 108-126 (2021).
MSC:  68W35 94A60
PDFBibTeX XMLCite
Full Text: DOI

KHAPE: Asymmetric PAKE from key-hiding key exchange. (English) Zbl 1489.94097

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 701-730 (2021).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Thinking outside the superbox. (English) Zbl 1487.94104

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 337-367 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Differential-linear cryptanalysis from an algebraic perspective. (English) Zbl 1486.94125

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 247-277 (2021).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Algebraic key-recovery attacks on reduced-round Xoofff. (English) Zbl 1485.94074

Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 171-197 (2021).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Exploring semi-bent Boolean functions arising from cellular automata. (English) Zbl 1492.68092

Gwizdałła, Tomasz M. (ed.) et al., Cellular automata. 14th international conference on cellular automata for research and industry, ACRI 2020, Lodz, Poland, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12599, 56-66 (2021).
MSC:  68Q80 94A60 94D10
PDFBibTeX XMLCite
Full Text: DOI arXiv

Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes. (English) Zbl 07497444

Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 140-154 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Design of hash function using two dimensional cellular automata. (English) Zbl 07388835

Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 33-45 (2021).
MSC:  68-XX
PDFBibTeX XMLCite
Full Text: DOI

Secure implementation of lattice-based encryption schemes. (English) Zbl 1528.94073

Drechsler, Rolf (ed.) et al., Advanced Boolean techniques. Selected papers from the 13th international workshop on Boolean problems, Bremen, Germany, September 19–21, 2018. Cham: Springer. 21-49 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An algebraic attack on ciphers with low-degree round functions: application to full MiMC. (English) Zbl 1511.94094

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 477-506 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems. (English) Zbl 1504.94105

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 299-328 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

The MALICIOUS framework: embedding backdoors into tweakable block ciphers. (English) Zbl 1504.94178

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 249-278 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic verification of differential characteristics: application to reduced Gimli. (English) Zbl 1499.94045

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 219-248 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

BBB secure nonce based MAC using public permutations. (English) Zbl 1504.94136

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2020. 12th international conference on cryptology in Africa, Cairo, Egypt, July 20–22, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12174, 172-191 (2020).
MSC:  94A60 05A05
PDFBibTeX XMLCite
Full Text: DOI

New results on the SymSum distinguisher on round-reduced SHA3. (English) Zbl 1501.94056

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2020. 12th international conference on cryptology in Africa, Cairo, Egypt, July 20–22, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12174, 132-151 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Trade-offs in protecting Keccak against combined side-channel and fault attacks. (English) Zbl 1522.94084

Polian, Ilia (ed.) et al., Constructive side-channel analysis and secure design. 10th international workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11421, 285-302 (2019).
MSC:  94A60 94A40
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on round-reduced Keccak-224/256 via an allocating approach. (English) Zbl 1509.94111

Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11478, 556-584 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient cryptography on the RISC-V architecture. (English) Zbl 1453.94116

Schwabe, Peter (ed.) et al., Progress in cryptology – LATINCRYPT 2019. 6th international conference on cryptology and information security in Latin America, Santiago de Chile, Chile, October 2–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11774, 323-340 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje. (English) Zbl 1447.94032

Cid, Carlos (ed.) et al., Selected areas in cryptography – SAC 2018. 25th international conference, Calgary, AB, Canada, August 15–17, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11349, 257-277 (2019).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Protecting triple-DES against DPA. A practical application of domain-oriented masking. (English) Zbl 1450.94043

Fan, Junfeng (ed.) et al., Constructive side-channel analysis and secure design. 9th international workshop, COSADE 2018, Singapore, April 23–24, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10815, 207-226 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New MILP modeling: improved conditional cube attacks on KECCAK-based constructions. (English) Zbl 1446.94159

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 65-95 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

KangarooTwelve: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\). (English) Zbl 1440.94031

Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 400-418 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing. (English) Zbl 1440.94043

Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 137-153 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs. (English) Zbl 1380.94119

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70696-2/pbk; 978-3-319-70697-9/ebook). Lecture Notes in Computer Science 10625, 273-302 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software