×

Found 470 Documents (Results 1–100)

How to use (plain) witness encryption: registered ABE, flexible broadcast, and more. (English) Zbl 07800219

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14084, 498-531 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

The pseudorandom oracle model and ideal obfuscation. (English) Zbl 07800211

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14084, 233-262 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Horst meets Fluid-SPN: Griffin for zero-knowledge applications. (English) Zbl 07799268

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 573-606 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

New design techniques for efficient arithmetization-oriented hash functions: Anemoi permutations and Jive compression mode. (English) Zbl 07799266

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 507-539 (2023).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Fairer comparisons for travelling salesman problem solutions using hash functions. (English) Zbl 07787610

Pérez Cáceres, Leslie (ed.) et al., Evolutionary computation in combinatorial optimization. 23rd European conference, EvoCOP 2023, held as part of EvoStar 2023, Brno, Czech Republic, April 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13987, 1-15 (2023).
MSC:  68W50 90C27 90C59
PDFBibTeX XMLCite
Full Text: DOI

A new algebraic approach to the regular syndrome decoding problem and implications for PCG constructions. (English) Zbl 1528.94037

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 391-422 (2023).
PDFBibTeX XMLCite
Full Text: DOI HAL

Optimal security for keyed hash functions: avoiding time-space tradeoffs for finding collisions. (English) Zbl 1528.94050

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 440-469 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Recovering the tight security proof of SPHINCS\textsuperscript{+}. (English) Zbl 1519.94136

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13794, 3-33 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Correlation-intractable hash functions via shift-hiding. (English) Zbl 07829334

Braverman, Mark (ed.), 13th innovations in theoretical computer science conference, ITCS 2022, Berkeley, CA, USA, January 31 – February 3, 2022. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 215, Article 102, 16 p. (2022).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

Block-cipher-based tree hashing. (English) Zbl 07708475

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13510, 205-233 (2022).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

The theory of hash functions and random oracles. An approach to modern cryptography. (English) Zbl 1490.94001

Information Security and Cryptography. Cham: Springer (ISBN 978-3-030-63286-1/hbk; 978-3-030-63289-2/pbk; 978-3-030-63287-8/ebook). xxiii, 788 p. (2022).
MSC:  94-02 94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Incremental edge orientation in forests. (English) Zbl 07740867

Mutzel, Petra (ed.) et al., 29th annual European symposium on algorithms. ESA 2021, Lisbon, Portugal (virtual conference), September 6–8, 2021. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 204, Article 12, 18 p. (2021).
MSC:  68Wxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

\(T_5\): Hashing five inputs with three compression calls. (English) Zbl 07706056

Tessaro, Stefano (ed.), 2nd conference on information-theoretic cryptography. ITC 2021, July 23–26, 2021, virtual conference. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 199, Article 24, 23 p. (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions. (English) Zbl 1485.94119

Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 273-300 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On the cost of ASIC hardware crackers: a SHA-1 case study. (English) Zbl 07449896

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 657-681 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Compactness of hashing modes and efficiency beyond Merkle tree. (English) Zbl 1479.94114

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 92-123 (2021).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Modern cryptography with proof techniques and implementations. (English) Zbl 1476.94001

Boca Raton, FL: CRC Press (ISBN 978-1-138-58408-2/hbk; 978-0-367-72323-1/pbk; 978-1-003-15256-9/ebook). xxv, 484 p. (2021).
PDFBibTeX XMLCite
Full Text: DOI

Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions. (English) Zbl 1506.94037

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 427-447 (2020).
MSC:  94A60 81P94 68P25
PDFBibTeX XMLCite
Full Text: DOI

Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems. (English) Zbl 1504.94105

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 299-328 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Round-optimal black-box commit-and-prove with succinct communication. (English) Zbl 1504.94162

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12171, 533-561 (2020).
MSC:  94A60 94A05
PDFBibTeX XMLCite
Full Text: DOI

Towards defeating backdoored random oracles: indifferentiability with bounded adaptivity. (English) Zbl 1485.94080

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 241-273 (2020).
MSC:  94A60 68P25 94A05
PDFBibTeX XMLCite
Full Text: DOI

Efficient range-trapdoor functions and applications: rate-1 OT and more. (English) Zbl 1479.94176

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12550, 88-116 (2020).
MSC:  94A60 65T50
PDFBibTeX XMLCite
Full Text: DOI

Tightly secure chameleon hash functions in the multi-user setting and their applications. (English) Zbl 1464.94040

Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 664-673 (2020).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Using merging variables-based local search to solve special variants of MaxSAT problem. (English) Zbl 1460.90155

Kochetov, Yury (ed.) et al., Mathematical optimization theory and operations research. 19th international conference, MOTOR 2020, Novosibirsk, Russia, July 6–10, 2020. Revised selected papers. Cham: Springer. Commun. Comput. Inf. Sci. 1275, 363-378 (2020).
MSC:  90C27 90C09
PDFBibTeX XMLCite
Full Text: DOI

Sparse hashing for scalable approximate model counting: theory and practice. (English) Zbl 07299508

Proceedings of the 2020 35th annual ACM/IEEE symposium on logic in computer science, LICS 2020, virtual event, July 8–11, 2020. New York, NY: Association for Computing Machinery (ACM). 728-741 (2020).
MSC:  68-XX
PDFBibTeX XMLCite
Full Text: DOI arXiv

On the real-world instantiability of admissible hash functions and efficient verifiable random functions. (English) Zbl 1453.94092

Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 303-332 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Supersingular isogeny graphs in cryptography. (English) Zbl 1476.94028

Lo, Allan (ed.) et al., Surveys in combinatorics 2019. Papers based on the 27th British combinatorial conference, University of Birmingham, Birmingham, UK, July 29 – August 2, 2019. Cambridge: Cambridge University Press. Lond. Math. Soc. Lect. Note Ser. 456, 143-165 (2019).
PDFBibTeX XMLCite
Full Text: DOI

Decisional second-preimage resistance: when does SPR imply PRE? (English) Zbl 1455.94125

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 33-62 (2019).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Quantum security of hash functions and property-preservation of iterated hashing. (English) Zbl 1509.81373

Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 329-349 (2019).
MSC:  81P94 94A60 68M25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Distributional collision resistance beyond one-way functions. (English) Zbl 1509.94066

Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11478, 667-695 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

On hashing-based approaches to approximate DNF-counting. (English) Zbl 1491.68193

Lokam, Satya (ed.) et al., 37th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2017, IIT Kanpur, India, December 12–14, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 93, Article 41, 14 p. (2018).
MSC:  68T20 68W20 68W25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Multi-collision resistance: a paradigm for keyless hash functions. (English) Zbl 1427.94076

Diakonikolas, Ilias (ed.) et al., Proceedings of the 50th annual ACM SIGACT symposium on theory of computing, STOC ’18, Los Angeles, CA, USA, June 25–29, 2018. New York, NY: Association for Computing Machinery (ACM). 671-684 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Trapdoor functions from the computational Diffie-Hellman assumption. (English) Zbl 1436.94067

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 362-391 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Recent developments in Cayley hash functions. (English) Zbl 1398.94165

Davenport, James H. (ed.) et al., Mathematical software – ICMS 2018. 6th international conference, South Bend, IN, USA, July 24–27, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-96417-1/pbk; 978-3-319-96418-8/ebook). Lecture Notes in Computer Science 10931, 438-447 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-collision resistant hash functions and their applications. (English) Zbl 1423.94050

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 133-161 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leighton-Micali hash-based signatures in the quantum random-oracle model. (English) Zbl 1384.94060

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 263-280 (2018).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Long-term secure time-stamping using preimage-aware hash functions (short version). (English) Zbl 1439.94081

Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 251-260 (2017).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper). (English) Zbl 1398.94180

Obana, Satoshi (ed.) et al., Advances in information and computer security. 12th international workshop on security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-64199-7/pbk; 978-3-319-64200-0/ebook). Lecture Notes in Computer Science 10418, 231-241 (2017).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Fast and scalable minimal perfect hashing for massive key sets. (English) Zbl 1433.68104

Iliopoulos, Costas S. (ed.) et al., 16th international symposium on experimental algorithms, SEA 2017, London, UK, June 21–23, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 75, Article 25, 16 p. (2017).
MSC:  68P05 68P20 68W40
PDFBibTeX XMLCite
Full Text: DOI arXiv

Low-complexity cryptographic hash functions. (English) Zbl 1402.94051

Papadimitriou, Christos H. (ed.), 8th innovations in theoretical computer science conference, ITCS 2017, Berkeley, CA, USA, January 9–11, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-029-3). LIPIcs – Leibniz International Proceedings in Informatics 67, Article 7, 31 p. (2017).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3. (English) Zbl 1418.94028

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 317-337 (2017).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

CCA-secure inner-product functional encryption from projective hash functions. (English) Zbl 1400.94120

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 36-66 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Evaluation of the computational complexity of some hash functions. (English) Zbl 1410.68113

Simian, Dana (ed.), Modelling and development of intelligent systems. Proceedings of the fourth international conference, Sibiu, Romania, October 28 – November 1, 2015. Sibiu: “Lucian Blaga” University Press. 78-85 (2016).
MSC:  68P25 68Q25 94A60
PDFBibTeX XMLCite

Analysis of the Kupyna-256 hash function. (English) Zbl 1385.94031

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 575-590 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptographic hash functions from sequences of lifted Paley graphs. (English) Zbl 1359.05132

Kahrobaei, Delaram (ed.) et al., Algebra and computer science. Joint AMS-EMS-SPM meeting algebra and computer science, Porto, Portugal, June 10–13, 2015. Joint mathematics meetings groups, algorithms, and cryptography, San Antonio, TX, USA, January 10–13, 2015. Joint AMS-Israel Mathematical Union meeting applications of algebra to cryptography, Tel-Aviv, Israel, June 16–19, 2014. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-2303-2/pbk; 978-1-4704-3587-5/ebook). Contemporary Mathematics 677, 213-229 (2016).
PDFBibTeX XMLCite
Full Text: DOI

MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity. (English) Zbl 1404.94035

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 191-219 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Structure-preserving smooth projective hashing. (English) Zbl 1407.94088

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 339-369 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Collapse-binding quantum commitments without random oracles. (English) Zbl 1407.94156

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 166-195 (2016).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

On negation complexity of injections, surjections and collision-resistance in cryptography. (English) Zbl 1411.94077

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 345-363 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Biclique cryptanalysis of full round AES-128 based hashing modes. (English) Zbl 1344.94036

Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-38897-7/pbk; 978-3-319-38898-4/ebook). Lecture Notes in Computer Science 9589, 3-21 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software