International Conference on the Theory and Application of Cryptographic Techniques最新文献

筛选
英文 中文
Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT 改进线性攻击中的密钥恢复:应用于28轮PRESENT
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2020-05-10 DOI: 10.1007/978-3-030-45721-1_9
Antonio Flórez-Gutiérrez, M. Naya-Plasencia
{"title":"Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT","authors":"Antonio Flórez-Gutiérrez, M. Naya-Plasencia","doi":"10.1007/978-3-030-45721-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-45721-1_9","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation 利用故障传播的块密码故障模板攻击
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2020-05-10 DOI: 10.1007/978-3-030-45721-1_22
Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay
{"title":"Fault Template Attacks on Block Ciphers Exploiting Fault Propagation","authors":"Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay","doi":"10.1007/978-3-030-45721-1_22","DOIUrl":"https://doi.org/10.1007/978-3-030-45721-1_22","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations 龙卷风:自动生成探测安全掩码位切片实现
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2020-05-10 DOI: 10.1007/978-3-030-45727-3_11
Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
{"title":"Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations","authors":"Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff","doi":"10.1007/978-3-030-45727-3_11","DOIUrl":"https://doi.org/10.1007/978-3-030-45727-3_11","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Tight Security Bounds for Double-Block Hash-then-Sum MACs 双块Hash-then-Sum mac的严格安全边界
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2020-05-10 DOI: 10.1007/978-3-030-45721-1_16
Seong-Hak Kim, ByeongHak Lee, Jooyoung Lee
{"title":"Tight Security Bounds for Double-Block Hash-then-Sum MACs","authors":"Seong-Hak Kim, ByeongHak Lee, Jooyoung Lee","doi":"10.1007/978-3-030-45721-1_16","DOIUrl":"https://doi.org/10.1007/978-3-030-45721-1_16","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133274421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Classical Proofs of Quantum Knowledge 量子知识的经典证明
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-77886-6_22
Thomas Vidick, Tina Zhang
{"title":"Classical Proofs of Quantum Knowledge","authors":"Thomas Vidick, Tina Zhang","doi":"10.1007/978-3-030-77886-6_22","DOIUrl":"https://doi.org/10.1007/978-3-030-77886-6_22","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128125411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Continuous Non-Malleable Codes in the 8-Split-State Model 8分裂状态模型中的连续非延展性码
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17653-2_18
Divesh Aggarwal, Nico Döttling, J. Nielsen, Maciej Obremski, Erick Purwanto
{"title":"Continuous Non-Malleable Codes in the 8-Split-State Model","authors":"Divesh Aggarwal, Nico Döttling, J. Nielsen, Maciej Obremski, Erick Purwanto","doi":"10.1007/978-3-030-17653-2_18","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_18","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Computationally Volume-Hiding Structured Encryption 计算卷隐藏结构化加密
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17656-3_7
S. Kamara, Tarik Moataz
{"title":"Computationally Volume-Hiding Structured Encryption","authors":"S. Kamara, Tarik Moataz","doi":"10.1007/978-3-030-17656-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-17656-3_7","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129616668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
How to Leverage Hardness of Constant-Degree Expanding Polynomials over mathbb R R to build i풪 i O 如何利用在mathbb R R上的常度展开多项式的硬度来构建i풪i O
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17653-2_9
Aayush Jain, Huijia Lin, Christian Matt, A. Sahai
{"title":"How to Leverage Hardness of Constant-Degree Expanding Polynomials over mathbb R R to build i풪 i O","authors":"Aayush Jain, Huijia Lin, Christian Matt, A. Sahai","doi":"10.1007/978-3-030-17653-2_9","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_9","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114400616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Compact Adaptively Secure ABE for mathsf NC^1 from k-Lin 基于k-Lin的mathsf NC^1的紧凑自适应安全ABE
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17653-2_1
Lucas Kowalczyk, H. Wee
{"title":"Compact Adaptively Secure ABE for mathsf NC^1 from k-Lin","authors":"Lucas Kowalczyk, H. Wee","doi":"10.1007/978-3-030-17653-2_1","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_1","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Symbolic Encryption with Pseudorandom Keys 伪随机密钥的符号加密
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17659-4_3
Daniele Micciancio
{"title":"Symbolic Encryption with Pseudorandom Keys","authors":"Daniele Micciancio","doi":"10.1007/978-3-030-17659-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-17659-4_3","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"66 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120840611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信