## Found 50 Documents (Results 1–50)

### Minicrypt primitives with algebraic structure and applications.(English)Zbl 07638790

MSC:  94A60 94A62
Full Text:

### MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications.(English)Zbl 1489.94095

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 517-547 (2021).
MSC:  94A60 94A62
Full Text:

### Collusion resistant watermarkable PRFs from standard assumptions.(English)Zbl 07614552

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 590-620 (2020).
MSC:  94A60 94A62
Full Text:

### Statistical ZAP arguments.(English)Zbl 1479.94120

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 642-667 (2020).
MSC:  94A60
Full Text:

### Friet: an authenticated encryption scheme with built-in fault detection.(English)Zbl 1479.94343

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 581-611 (2020).
MSC:  94A62 94A60
Full Text:

Full Text:

### Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3.(English)Zbl 1418.94028

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 317-337 (2017).
MSC:  94A60 81P94
Full Text:

Full Text:

### Design of crypto primitives based on quasigroups.(English)Zbl 1397.94088

MSC:  94A60 20N05 68P25

### On the homomorphic computation of symmetric cryptographic primitives.(English)Zbl 1317.94124

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 28-44 (2013).
MSC:  94A60
Full Text:

### Feebly secure cryptographic primitives.(English. Russian original)Zbl 1262.94023

J. Math. Sci., New York 188, No. 1, 17-34 (2013); translation from Zap. Nauchn. Semin. POMI 399, 32-64 (2012).
MSC:  94A60 94C10
Full Text:

### Shapeless quasigroups derived by Feistel orthomorphisms.(English)Zbl 1269.94027

MSC:  94A60 20N05 94A55
Full Text:

Full Text:

### Encoding cryptographic primitives in a calculus with polyadic synchronisation.(English)Zbl 1216.68194

MSC:  68Q85 94A60
Full Text:

### On the prop ratio tables of extended Feistel networks and their quasigroups.(English)Zbl 1342.20064

MSC:  20N05 94A60
Full Text:

### Algebraic cryptography: new constructions and their security against provable break.(English. Russian original)Zbl 1206.94069

St. Petersbg. Math. J. 20, No. 6, 937-953 (2009); translation from Algebra Anal. 20, No. 6, 119-147 (2008).
Full Text:

### Improvement of authentication test based on strand spaces model.(Chinese. English summary)Zbl 1171.68354

MSC:  68M12 68M10
Full Text:

### Communication on inductively coupled channels: overview and challenges.(English)Zbl 1166.94300

Barbero, Ángela (ed.), Coding theory and applications. Second international castle meeting, ICMCTA 2008, Castillo de La Mota, Medina del Campo, Spain, September 15–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-87447-8/pbk). Lecture Notes in Computer Science 5228, 186-195 (2008).
MSC:  94A05 94A60
Full Text:

### Computationally private randomizing polynomials and their applications.(English)Zbl 1143.94009

MSC:  94A60 68Q15
Full Text:

### Constructing single- and multi-output Boolean functions with maximal algebraic immunity.(English)Zbl 1133.94308

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 180-191 (2006).
MSC:  94A60 06E30
Full Text:

### Cryptography in NC$$^0$$.(English)Zbl 1126.94014

MSC:  94A60 68P25 68Q15
Full Text:

### On robust combiners for private information retrieval and other primitives.(English)Zbl 1129.94030

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 555-569 (2006).
MSC:  94A60 68P20
Full Text:

MSC:  94A60

### The impossibility of basing one-way permutations on central cryptographic primitives.(English)Zbl 1096.94024

MSC:  94A60 68P25
Full Text:

### General principles of algebraic attacks and new design criteria for cipher components.(English)Zbl 1117.94315

Dobbertin, Hans (ed.) et al., Advanced encryption standard – AES. 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004. Revised selected and invited papers. Berlin: Springer (ISBN 3-540-26557-0/pbk). Lecture Notes in Computer Science 3373, 67-83 (2005).
MSC:  94A60
Full Text:

### Quantum lower bounds for the collision and the element distinctness problems.(English)Zbl 1169.68406

MSC:  68Q05 68Q17 68Q25 81P68
Full Text:

### Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity.(English)Zbl 1092.94505

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 352-369 (2004).
MSC:  94A60
Full Text:

### Threshold MACs.(English)Zbl 1031.94522

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 237-252 (2003).
MSC:  94A60 94A62
Full Text:

### On the universal hash functions in Luby-Rackoff cipher.(English)Zbl 1031.94518

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 226-236 (2003).
MSC:  94A60 68P25
Full Text:

### On the efficiency of the clock control guessing attack.(English)Zbl 1031.94531

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 200-212 (2003).
MSC:  94A60 94A55
Full Text:

### How to play Sherlock Holmes in the world of mobile agents.(English)Zbl 1024.94516

Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 449-463 (2002).
MSC:  94A62 68U35
Full Text:

### On the impossibilities of basing one-way permutations on central cryptographic primitives.(English)Zbl 1065.94542

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 110-124 (2002).
MSC:  94A60 65C10 68P25
Full Text:

### Blockwise-adaptive attackers. Revisiting the (in)security of some provably secure encryption modes: CBC, GEM, IACBC.(English)Zbl 1026.94531

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 17-30 (2002).
MSC:  94A60 68P25
Full Text:

### Minimal complete primitives for secure multi-party computation.(English)Zbl 1015.94541

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 80-100 (2001).
MSC:  94A60

### Distinguishing TEA from a random permutation: reduced round versions of TEA do not have the SAC or do not generate random numbers.(English)Zbl 1002.68810

Honary, Bahram (ed.), Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17-19, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2260, 374-377 (2001).
MSC:  94A60
Full Text:

### Generalized oblivious transfer protocols based on noisy channels.(English)Zbl 0995.94543

Gorodetski, V. I. (ed.) et al., Information assurance in computer networks. Methods, models and architectures for network security. International workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2052, 219-229 (2001).
MSC:  94A60
Full Text:

### A survey on IQ cryptography.(English)Zbl 0983.94034

Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 1-15 (2001).
MSC:  94A60 11R04 11R29

### Analysis of SHA-1 in encryption mode.(English)Zbl 0995.94541

Naccache, David (ed.), Topics in cryptology - CT-RSA 2001. The cryptographer’s track at RSA conference 2001, San Francisco, CA, USA, April 8-12, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2020, 70-83 (2001).
MSC:  94A60 68P25

MSC:  94A60
Full Text:

### Spectral bounds on general hard core predicates. (Extended abstract).(English)Zbl 0991.94036

Reichel, Horst (ed.) et al., STACS 2000. 17th annual symposium on Theoretical aspects of computer science. Lille, France, February 17-19, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1770, 614-625 (2000).
MSC:  94A60 06E30 94C10

### A top-down look at a secure message.(English)Zbl 0983.94511

Pandu Rangan, C. (ed.) et al., Foundations of software technology and theoretical computer science. 19th conference, Chennai, India, December 13-15, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1738, 122-141 (1999).
MSC:  94A60 68P25

### Recent developments in the design of conventional cryptographic algorithms.(English)Zbl 0955.94016

Preneel, Bart (ed.) et al., State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997. Revised lectures. Berlin: Springer. Lect. Notes Comput. Sci. 1528, 105-130 (1998).
MSC:  94A60 68P25

### Cryptographic primitives for information authentication – State of the art.(English)Zbl 0954.94018

Preneel, Bart (ed.) et al., State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997. Revised lectures. Berlin: Springer. Lect. Notes Comput. Sci. 1528, 49-104 (1998).
MSC:  94A62 94-02 94A60

### Highly nonlinear balanced Boolean functions with a good correlation-immunity.(English)Zbl 0919.94014

Nyberg, Kaisa (ed.), Advances in Cryptology. International conference on the Theory and application of cryptographic techniques. Espoo, Finland, May 31 - June 4, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1403, 475-488 (1998).
MSC:  94A60 06E30

MSC:  94A60
Full Text:

### Correlated pseudorandomness and the complexity of private computations.(English)Zbl 0917.94012

Proceedings of the 28th annual ACM symposium on the theory of computing (STOC). Philadelphia, PA, USA, May 22–24, 1996. New York, NY: ACM, 479-488 (1996).
MSC:  94A60 68Q25 68P25

### On the need for multipermutations: cryptanalysis of MD4 and SAFER.(English)Zbl 0939.94542

Preneel, Bart (ed.), Fast software encryption. 2nd international workshop, Leuven, Belgium, December 14-16, 1994. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 1008, 286-297 (1995).
MSC:  94A60 05A05
Full Text:

### Incremental cryptography: The case of hashing and signing.(English)Zbl 0939.94530

Desmedt, Yvo G. (ed.), Advances in cryptology - CRYPTO ’94. 14th annual international cryptology conference, Santa Barbara, CA, USA, August 21-25, 1994. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 839, 216-233 (1994).
MSC:  94A60

### Necessary and sufficient conditions for collision-free hashing.(English)Zbl 0817.94014

Brickell, Ernest F. (ed.), Advances in cryptology - CRYPTO ’92. 12th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 1992. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 740, 433-441 (1993).
MSC:  94A60

### Duality between two cryptographic primitives.(English)Zbl 0729.94014

Applied algebra, algebraic algorithms and error-correcting codes, Proc. 8th Int. Conf., AAECC-8, Tokyo/Jap. 1990, Lect. Notes Comput. Sci. 508, 379-390 (1991).
MSC:  94A60

all top 5

all top 5

all top 3

all top 3