×

Found 50 Documents (Results 1–50)

MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications. (English) Zbl 1489.94095

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 517-547 (2021).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Collusion resistant watermarkable PRFs from standard assumptions. (English) Zbl 07614552

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 590-620 (2020).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Statistical ZAP arguments. (English) Zbl 1479.94120

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 642-667 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Friet: an authenticated encryption scheme with built-in fault detection. (English) Zbl 1479.94343

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 581-611 (2020).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3. (English) Zbl 1418.94028

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 317-337 (2017).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI arXiv

On the homomorphic computation of symmetric cryptographic primitives. (English) Zbl 1317.94124

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 28-44 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Algebraic cryptography: new constructions and their security against provable break. (English. Russian original) Zbl 1206.94069

St. Petersbg. Math. J. 20, No. 6, 937-953 (2009); translation from Algebra Anal. 20, No. 6, 119-147 (2008).
PDF BibTeX XML Cite
Full Text: DOI

Communication on inductively coupled channels: overview and challenges. (English) Zbl 1166.94300

Barbero, Ángela (ed.), Coding theory and applications. Second international castle meeting, ICMCTA 2008, Castillo de La Mota, Medina del Campo, Spain, September 15–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-87447-8/pbk). Lecture Notes in Computer Science 5228, 186-195 (2008).
MSC:  94A05 94A60
PDF BibTeX XML Cite
Full Text: DOI

Constructing single- and multi-output Boolean functions with maximal algebraic immunity. (English) Zbl 1133.94308

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 180-191 (2006).
MSC:  94A60 06E30
PDF BibTeX XML Cite
Full Text: DOI

On robust combiners for private information retrieval and other primitives. (English) Zbl 1129.94030

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 555-569 (2006).
MSC:  94A60 68P20
PDF BibTeX XML Cite
Full Text: DOI

General principles of algebraic attacks and new design criteria for cipher components. (English) Zbl 1117.94315

Dobbertin, Hans (ed.) et al., Advanced encryption standard – AES. 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004. Revised selected and invited papers. Berlin: Springer (ISBN 3-540-26557-0/pbk). Lecture Notes in Computer Science 3373, 67-83 (2005).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. (English) Zbl 1092.94505

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 352-369 (2004).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Threshold MACs. (English) Zbl 1031.94522

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 237-252 (2003).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: Link

On the universal hash functions in Luby-Rackoff cipher. (English) Zbl 1031.94518

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 226-236 (2003).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: Link

How to play Sherlock Holmes in the world of mobile agents. (English) Zbl 1024.94516

Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 449-463 (2002).
MSC:  94A62 68U35
PDF BibTeX XML Cite
Full Text: Link

On the impossibilities of basing one-way permutations on central cryptographic primitives. (English) Zbl 1065.94542

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 110-124 (2002).
MSC:  94A60 65C10 68P25
PDF BibTeX XML Cite
Full Text: DOI

Blockwise-adaptive attackers. Revisiting the (in)security of some provably secure encryption modes: CBC, GEM, IACBC. (English) Zbl 1026.94531

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 17-30 (2002).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: Link

Minimal complete primitives for secure multi-party computation. (English) Zbl 1015.94541

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 80-100 (2001).
MSC:  94A60
PDF BibTeX XML Cite

Distinguishing TEA from a random permutation: reduced round versions of TEA do not have the SAC or do not generate random numbers. (English) Zbl 1002.68810

Honary, Bahram (ed.), Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17-19, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2260, 374-377 (2001).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Generalized oblivious transfer protocols based on noisy channels. (English) Zbl 0995.94543

Gorodetski, V. I. (ed.) et al., Information assurance in computer networks. Methods, models and architectures for network security. International workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2052, 219-229 (2001).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: Link

A survey on IQ cryptography. (English) Zbl 0983.94034

Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 1-15 (2001).
MSC:  94A60 11R04 11R29
PDF BibTeX XML Cite

Spectral bounds on general hard core predicates. (Extended abstract). (English) Zbl 0991.94036

Reichel, Horst (ed.) et al., STACS 2000. 17th annual symposium on Theoretical aspects of computer science. Lille, France, February 17-19, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1770, 614-625 (2000).
MSC:  94A60 06E30 94C10
PDF BibTeX XML Cite

Recent developments in the design of conventional cryptographic algorithms. (English) Zbl 0955.94016

Preneel, Bart (ed.) et al., State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997. Revised lectures. Berlin: Springer. Lect. Notes Comput. Sci. 1528, 105-130 (1998).
MSC:  94A60 68P25
PDF BibTeX XML Cite

Highly nonlinear balanced Boolean functions with a good correlation-immunity. (English) Zbl 0919.94014

Nyberg, Kaisa (ed.), Advances in Cryptology. International conference on the Theory and application of cryptographic techniques. Espoo, Finland, May 31 - June 4, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1403, 475-488 (1998).
MSC:  94A60 06E30
PDF BibTeX XML Cite

Correlated pseudorandomness and the complexity of private computations. (English) Zbl 0917.94012

Proceedings of the 28th annual ACM symposium on the theory of computing (STOC). Philadelphia, PA, USA, May 22–24, 1996. New York, NY: ACM, 479-488 (1996).
MSC:  94A60 68Q25 68P25
PDF BibTeX XML Cite

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software