×

Found 1,109 Documents (Results 1–100)

100
MathJax

The “Quantum annoying” property of password-authenticated key exchange protocols. (English) Zbl 1487.81065

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 154-173 (2021).
PDF BibTeX XML Cite
Full Text: DOI

Numerical solution of a stochastic model of a ball-type vibration absorber. (English) Zbl 07447608

Chleboun, J. (ed.) et al., Programs and algorithms of numerical mathematics 20. Proceedings of the 20th seminar (PANM), Hejnice, Czech Republic, June 21–26, 2020. Prague: Czech Academy of Sciences, Institute of Mathematics. 40-49 (2021).
PDF BibTeX XML Cite
Full Text: DOI

Algebraic distinguishers: from discrete logarithms to decisional Uber assumptions. (English) Zbl 1485.94117

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 366-389 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On the memory-tightness of hashed ElGamal. (English) Zbl 07496545

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 33-62 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model. (English) Zbl 07173866

Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 227-248 (2019).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Key encapsulation mechanism with explicit rejection in the quantum random oracle model. (English) Zbl 07159420

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 618-645 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Delegatable anonymous credentials from mercurial signatures. (English) Zbl 1453.94134

Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 535-555 (2019).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited. (English) Zbl 1457.94142

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10993, 96-125 (2018).
MSC:  94A60 81P68 81P94
PDF BibTeX XML Cite
Full Text: DOI

The algebraic group model and its applications. (English) Zbl 1430.94068

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 33-62 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Axl, a geometric modeler for semi-algebraic shapes. (English) Zbl 1396.65028

Davenport, James H. (ed.) et al., Mathematical software – ICMS 2018. 6th international conference, South Bend, IN, USA, July 24–27, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-96417-1/pbk; 978-3-319-96418-8/ebook). Lecture Notes in Computer Science 10931, 128-136 (2018).
PDF BibTeX XML Cite
Full Text: DOI Link

An efficient pairing-based shuffle argument. (English) Zbl 1380.94088

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70696-2/pbk; 978-3-319-70697-9/ebook). Lecture Notes in Computer Science 10625, 97-127 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Classification

all top 3

Software