×

Found 7 Documents (Results 1–7)

Turn-based communication channels. (English) Zbl 1511.94063

Huang, Qiong (ed.) et al., Provable and practical security. 15th international conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13059, 376-392 (2021).
PDFBibTeX XMLCite
Full Text: DOI

Fine-grained cryptography revisited. (English) Zbl 1458.94232

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 637-666 (2019).
MSC:  94A60 94C05
PDFBibTeX XMLCite
Full Text: DOI

A framework for achieving KDM-CCA secure public-key encryption. (English) Zbl 1446.94146

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 127-157 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency. (English) Zbl 1368.94152

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 213-229 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Generic transformation to strongly existentially unforgeable signature schemes with leakage resiliency. (English) Zbl 1368.94151

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 117-129 (2014).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the weak ideal compression functions. (English) Zbl 1284.94096

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 232-248 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software