International Conference on Cryptology in Africa最新文献

筛选
英文 中文
SHA-3 on ARM11 Processors ARM11处理器上的SHA-3
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_20
P. Schwabe, Bo-Yin Yang, Shang-Yi Yang
{"title":"SHA-3 on ARM11 Processors","authors":"P. Schwabe, Bo-Yin Yang, Shang-Yi Yang","doi":"10.1007/978-3-642-31410-0_20","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_20","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129778786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator 基于直接和分解的非线性滤波发生器攻击
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_4
Jingjing Wang, Xiangxue Li, Kefei Chen, Wen-zheng Zhang
{"title":"Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator","authors":"Jingjing Wang, Xiangxue Li, Kefei Chen, Wen-zheng Zhang","doi":"10.1007/978-3-642-31410-0_4","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_4","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Performance of the SYND Stream Cipher 改进SYND流密码的性能
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_7
M. Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel
{"title":"Improving the Performance of the SYND Stream Cipher","authors":"M. Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel","doi":"10.1007/978-3-642-31410-0_7","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_7","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127572767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Size-Hiding in Private Set Intersection: Existential Results and Constructions 私集交集中的大小隐藏:存在性结果和构造
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_23
P. D’Arco, María Isabel González Vasco, Á. L. P. D. Pozo, Claudio Soriente
{"title":"Size-Hiding in Private Set Intersection: Existential Results and Constructions","authors":"P. D’Arco, María Isabel González Vasco, Á. L. P. D. Pozo, Claudio Soriente","doi":"10.1007/978-3-642-31410-0_23","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_23","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"60 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption 移位型同态加密及其在全同态加密中的应用
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_15
Frederik Armknecht, S. Katzenbeisser, Andreas Peter
{"title":"Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption","authors":"Frederik Armknecht, S. Katzenbeisser, Andreas Peter","doi":"10.1007/978-3-642-31410-0_15","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_15","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129839607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fuzzy Vault for Multiple Users 多用户模糊保险库
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_5
J. Bringer, H. Chabanne, M. Favre
{"title":"Fuzzy Vault for Multiple Users","authors":"J. Bringer, H. Chabanne, M. Favre","doi":"10.1007/978-3-642-31410-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_5","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important 增强型TTS、STS及其所有变体的密码分析,或:为什么交叉项很重要
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_12
Enrico Thomae, Christopher Wolf
{"title":"Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important","authors":"Enrico Thomae, Christopher Wolf","doi":"10.1007/978-3-642-31410-0_12","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_12","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125927077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
The Collision Security of MDC-4 MDC-4的碰撞安全
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_16
E. Fleischmann, C. Forler, S. Lucks
{"title":"The Collision Security of MDC-4","authors":"E. Fleischmann, C. Forler, S. Lucks","doi":"10.1007/978-3-642-31410-0_16","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_16","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114554816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Black-Box Reductions and Separations in Cryptography 密码学中的黑盒约简与分离
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_26
M. Fischlin
{"title":"Black-Box Reductions and Separations in Cryptography","authors":"M. Fischlin","doi":"10.1007/978-3-642-31410-0_26","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_26","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"125 25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Complementary Analysis of the (s)YZ and DIKE Protocols YZ和DIKE协议的补充分析
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_13
Augustin P. Sarr, P. Elbaz-Vincent
{"title":"A Complementary Analysis of the (s)YZ and DIKE Protocols","authors":"Augustin P. Sarr, P. Elbaz-Vincent","doi":"10.1007/978-3-642-31410-0_13","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_13","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"2685 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127486000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信