×

Found 81 Documents (Results 1–81)

Random oracle combiners: breaking the concatenation barrier for collision-resistance. (English) Zbl 07799232

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 514-546 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Certifying giant nonprimes. (English) Zbl 07770267

Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 530-553 (2023).
MSC:  11Y11 94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical statistically-sound proofs of exponentiation in any group. (English) Zbl 1517.94109

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 370-399 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Grafting key trees: efficient key management for overlapping groups. (English) Zbl 1511.94042

Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13044, 222-253 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The cost of adaptivity in security games on graphs. (English) Zbl 1511.94115

Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 550-581 (2021).
MSC:  94A60 05C57 91A43
PDFBibTeX XMLCite
Full Text: DOI

Trojan-resilience without cryptography. (English) Zbl 07674385

Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 397-428 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Limits on the adaptive security of Yao’s garbling. (English) Zbl 1486.94113

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 486-515 (2021).
MSC:  94A60 94D10
PDFBibTeX XMLCite
Full Text: DOI

Inverse-Sybil attacks in automated contact tracing. (English) Zbl 1479.94116

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 399-421 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Delayed authentication: preventing replay and relay attacks in private contact tracing. (English) Zbl 1492.94158

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 3-15 (2020).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. (English) Zbl 1482.94009

Lecture Notes in Computer Science 12552. Cham: Springer (ISBN 978-3-030-64380-5/pbk; 978-3-030-64381-2/ebook). xii, 273 p. (2020).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part II. (English) Zbl 1482.94008

Lecture Notes in Computer Science 12551. Cham: Springer (ISBN 978-3-030-64377-5/pbk; 978-3-030-64378-2/ebook). xii, 260 p. (2020).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. (English) Zbl 1475.94013

Lecture Notes in Computer Science 12550. Cham: Springer (ISBN 978-3-030-64374-4/pbk; 978-3-030-64375-1/ebook). xvi, 707 p. (2020).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Reversible proofs of sequential work. (English) Zbl 1428.94050

Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11477, 277-291 (2019).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Finding a Nash equilibrium is no easier than breaking Fiat-Shamir. (English) Zbl 1434.94063

Charikar, Moses (ed.) et al., Proceedings of the 51st annual ACM SIGACT symposium on theory of computing, STOC ’19, Phoenix, AZ, USA, June 23–26, 2019. New York, NY: Association for Computing Machinery (ACM). 1103-1114 (2019).
MSC:  94A60 91A80 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure proxy re-encryption. (English) Zbl 1509.94087

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 317-346 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simple proofs of sequential work. (English) Zbl 1428.94067

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 451-467 (2018).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Sustained space complexity. (English) Zbl 1423.94045

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 99-130 (2018).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Non-uniform attacks against pseudoentropy. (English) Zbl 1441.94094

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 39, 13 p. (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Beyond Hellman’s time-memory trade-offs with applications to proofs of space. (English) Zbl 1409.94858

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10625, 357-379 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Position-based cryptography and multiparty communication complexity. (English) Zbl 1410.94054

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10677, 56-81 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Be adaptive, avoid overcommitting. (English) Zbl 1407.94123

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10401, 133-163 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Scrypt is maximally memory-hard. (English) Zbl 1394.94925

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-56616-0/pbk; 978-3-319-56617-7/ebook). Lecture Notes in Computer Science 10212, 33-62 (2017).
MSC:  94A60 68Q10
PDFBibTeX XMLCite
Full Text: DOI

Depth-robust graphs and their cumulative memory complexity. (English) Zbl 1390.94827

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-56616-0/pbk; 978-3-319-56617-7/ebook). Lecture Notes in Computer Science 10212, 3-32 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Pseudoentropy: lower-bounds for chain rules and transformations. (English) Zbl 1369.94563

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 183-203 (2016).
MSC:  94A60 94A17
PDFBibTeX XMLCite
Full Text: DOI

Offline witness encryption. (English) Zbl 1348.94029

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 285-303 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the complexity of scrypt and proofs of space in the parallel random oracle model. (English) Zbl 1369.94518

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49895-8/pbk; 978-3-662-49896-5/ebook). Lecture Notes in Computer Science 9666, 358-387 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Constrained PRFs for unbounded inputs. (English) Zbl 1334.94053

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 413-428 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Standard security does imply security against selective opening for Markov distributions. (English) Zbl 1348.94046

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 282-305 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient zero-knowledge proofs for commitments from learning with errors over rings. (English) Zbl 1499.68113

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 305-325 (2015).
MSC:  68Q10 68Q11 94A60
PDFBibTeX XMLCite
Full Text: DOI

New realizations of somewhere statistically binding hashing and positional accumulators. (English) Zbl 1396.94093

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 121-145 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic security of NMAC and HMAC with input whitening. (English) Zbl 1375.94128

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 85-109 (2015).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

A quasipolynomial reduction for generalized selective decryption on trees. (English) Zbl 1375.94125

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 601-620 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC. (English) Zbl 1375.94127

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 368-387 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Proofs of space. (English) Zbl 1369.94531

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 585-605 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

The chain rule for HILL pseudoentropy, revisited. (English) Zbl 1370.94538

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 81-98 (2015).
MSC:  94A60 94A17
PDFBibTeX XMLCite
Full Text: DOI

Key-homomorphic constrained pseudorandom functions. (English) Zbl 1315.94052

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 31-60 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Adaptive security of constrained PRFs. (English) Zbl 1317.94107

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 82-101 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The exact PRF-security of NMAC and HMAC. (English) Zbl 1343.94050

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 113-130 (2014).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

Key derivation without entropy waste. (English) Zbl 1326.94085

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 93-110 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Simple chosen-ciphertext security from low-noise LPN. (English) Zbl 1335.94059

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 1-18 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to fake auxiliary input. (English) Zbl 1326.94102

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 566-590 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Digital signatures with minimal overhead from indifferentiable random invertible functions. (English) Zbl 1310.94156

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 571-588 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Learning with rounding, revisited. New reduction, properties and applications. (English) Zbl 1310.94123

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 57-74 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it. (English) Zbl 1297.94083

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 23-39 (2013).
MSC:  94A60 94A17
PDFBibTeX XMLCite
Full Text: DOI

Commitments and efficient zero-knowledge proofs from learning parity with noise. (English) Zbl 1292.94082

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 663-680 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical leakage-resilient symmetric cryptography. (English) Zbl 1366.94490

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 213-232 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Subspace LWE. (English) Zbl 1296.94136

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 548-563 (2012).
MSC:  94A60 68Q25 68P25
PDFBibTeX XMLCite
Full Text: DOI

Lossy functions do not amplify well. (English) Zbl 1303.94098

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 458-475 (2012).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

Hardness preserving constructions of pseudorandom functions. (English) Zbl 1303.94084

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 369-382 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptography from learning parity with noise. (English) Zbl 1298.94103

Bieliková, Mária (ed.) et al., SOFSEM 2012: Theory and practice of computer science. 38th conference on current trends in theory and practice of computer science, Špindlerův Mlýn, Czech Republic, January 21–27, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27659-0/pbk). Lecture Notes in Computer Science 7147, 99-114 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leftover hash lemma, revisited. (English) Zbl 1287.94047

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 1-20 (2011).
MSC:  94A60 94A15 94A17
PDFBibTeX XMLCite
Full Text: DOI

Tamper-proof circuits: how to trade leakage for tamper-resilience. (English) Zbl 1333.94034

Aceto, Luca (ed.) et al., Automata, languages and programming. 38th international colloquium, ICALP 2011, Zurich, Switzerland, July 4–8, 2011. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-22005-0/pbk). Lecture Notes in Computer Science 6755, 391-402 (2011).
MSC:  94A60 94C10
PDFBibTeX XMLCite
Full Text: DOI

Parallel repetition for leakage resilience amplification revisited. (English) Zbl 1290.94093

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 58-69 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Leakage resilient ElGamal encryption. (English) Zbl 1290.94103

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 595-612 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. (English) Zbl 1280.94047

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 21-40 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An efficient parallel repetition theorem. (English) Zbl 1274.94075

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 1-18 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new randomness extraction paradigm for hybrid encryption. (English) Zbl 1239.94055

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 590-609 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A leakage-resilient mode of operation. (English) Zbl 1239.94062

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 462-482 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of padding-based encryption schemes – or – why we cannot prove OAEP secure in the standard model. (English) Zbl 1239.94054

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 389-406 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compression from collisions, or why CRHF combiners have a long output. (English) Zbl 1183.68277

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 413-432 (2008).
MSC:  68P30 94A60
PDFBibTeX XMLCite
Full Text: DOI

Robust multi-property combiners for hash functions revisited. (English) Zbl 1155.94366

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 655-666 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Weak pseudorandom functions in Minicrypt. (English) Zbl 1155.94380

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 423-436 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A new mode of operation for block ciphers and length-preserving MACs. (English) Zbl 1149.94311

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 198-219 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Indistinguishability amplification. (English) Zbl 1215.94062

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 130-149 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Improving the security of MACs via randomized message preprocessing. (English) Zbl 1186.94434

Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 414-433 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Range extension for weak PRFs; the good, the bad, and the ugly. (English) Zbl 1141.94370

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 517-533 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Non-trivial black-box combiners for collision-resistant hash-functions don’t exist. (English) Zbl 1141.94369

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 23-33 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Parallel repetition of computationally sound protocols revisited. (English) Zbl 1129.94035

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 86-102 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Luby-Rackoff ciphers from weak round functions? (English) Zbl 1140.94360

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 391-408 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Composition implies adaptive security in Minicrypt. (English) Zbl 1140.94367

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 328-338 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A tight bound for EMAC. (English) Zbl 1133.94334

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 168-179 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved security analyses for CBC MACs. (English) Zbl 1145.94432

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 527-545 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the generic insecurity of the full domain hash. (English) Zbl 1145.94440

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 449-466 (2005).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Composition of random systems: When two weak make one strong. (English) Zbl 1197.94195

Naor, Moni (ed.), Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19–21, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21000-8/pbk). Lecture Notes in Computer Science 2951, 410-427 (2004).
MSC:  94A60 60C05
PDFBibTeX XMLCite
Full Text: DOI

The security of many-round Luby-Rackoff pseudo-random permutations. (English) Zbl 1038.94542

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 544-561 (2003).
MSC:  94A60 68Q25 65C10
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software