International Conference on the Theory and Application of Cryptographic Techniques最新文献

筛选
英文 中文
An Analysis of NIST SP 800-90A NIST SP 800-90A分析
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17656-3_6
Joanne Woodage, D. Shumow
{"title":"An Analysis of NIST SP 800-90A","authors":"Joanne Woodage, D. Shumow","doi":"10.1007/978-3-030-17656-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-17656-3_6","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128517758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation 无多线性映射的不可区分混淆:bootstrap和实例化的新方法
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17653-2_7
Shweta Agrawal
{"title":"Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation","authors":"Shweta Agrawal","doi":"10.1007/978-3-030-17653-2_7","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_7","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"413 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132380986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs 部分分裂环中的短可逆元及其在基于格的零知识证明中的应用
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2018-04-29 DOI: 10.1007/978-3-319-78381-9_8
Vadim Lyubashevsky, Gregor Seiler
{"title":"Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs","authors":"Vadim Lyubashevsky, Gregor Seiler","doi":"10.1007/978-3-319-78381-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-78381-9_8","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain Ouroboros Praos:一种自适应安全、半同步的权益证明区块链
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2018-04-29 DOI: 10.1007/978-3-319-78375-8_3
B. David, Peter Gazi, A. Kiayias, A. Russell
{"title":"Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain","authors":"B. David, Peter Gazi, A. Kiayias, A. Russell","doi":"10.1007/978-3-319-78375-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-78375-8_3","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123179314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 400
Fuzzy Password-Authenticated Key Exchange 模糊密码认证密钥交换
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2018-04-29 DOI: 10.1007/978-3-319-78372-7_13
Pierre-Alain Dupont, Julia Hesse, D. Pointcheval, L. Reyzin, Sophia Yakoubov
{"title":"Fuzzy Password-Authenticated Key Exchange","authors":"Pierre-Alain Dupont, Julia Hesse, D. Pointcheval, L. Reyzin, Sophia Yakoubov","doi":"10.1007/978-3-319-78372-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-78372-7_13","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131675091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Exploring the Boundaries of Topology-Hiding Computation 探索拓扑隐藏计算的边界
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2018-04-29 DOI: 10.1007/978-3-319-78372-7_10
Marshall Ball, Elette Boyle, T. Malkin, T. Moran
{"title":"Exploring the Boundaries of Topology-Hiding Computation","authors":"Marshall Ball, Elette Boyle, T. Malkin, T. Moran","doi":"10.1007/978-3-319-78372-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-78372-7_10","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131887957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Non-malleable Codes from Average-Case Hardness: $${mathsf {A}}{mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering 来自平均情况硬度的不可延展性代码:$${mathsf {A}}{mathsf {C}}^0$$,决策树和流空间边界篡改
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2018-04-29 DOI: 10.1007/978-3-319-78372-7_20
Marshall Ball, D. Dachman-Soled, Mukul Kulkarni, T. Malkin
{"title":"Non-malleable Codes from Average-Case Hardness: $${mathsf {A}}{mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering","authors":"Marshall Ball, D. Dachman-Soled, Mukul Kulkarni, T. Malkin","doi":"10.1007/978-3-319-78372-7_20","DOIUrl":"https://doi.org/10.1007/978-3-319-78372-7_20","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions 超奇异等同图与自同态环:约化与解
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2018-04-29 DOI: 10.1007/978-3-319-78372-7_11
Kirsten Eisenträger, Sean Hallgren, K. Lauter, T. Morrison, C. Petit
{"title":"Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions","authors":"Kirsten Eisenträger, Sean Hallgren, K. Lauter, T. Morrison, C. Petit","doi":"10.1007/978-3-319-78372-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-78372-7_11","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122000119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits 乱码交互电路中k轮无关传输的k轮多方计算
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2018-04-29 DOI: 10.1007/978-3-319-78375-8_17
Fabrice Benhamouda, Huijia Lin
{"title":"k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits","authors":"Fabrice Benhamouda, Huijia Lin","doi":"10.1007/978-3-319-78375-8_17","DOIUrl":"https://doi.org/10.1007/978-3-319-78375-8_17","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
Quantum-Access-Secure Message Authentication via Blind-Unforgeability 基于盲不可伪造的量子访问安全消息认证
International Conference on the Theory and Application of Cryptographic Techniques Pub Date : 2018-03-10 DOI: 10.1007/978-3-030-45727-3_27
G. Alagic, Christian Majenz, A. Russell, F. Song
{"title":"Quantum-Access-Secure Message Authentication via Blind-Unforgeability","authors":"G. Alagic, Christian Majenz, A. Russell, F. Song","doi":"10.1007/978-3-030-45727-3_27","DOIUrl":"https://doi.org/10.1007/978-3-030-45727-3_27","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115865335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信