International Conference on Cryptology in Africa最新文献

筛选
英文 中文
Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption Scheme 拟循环MDPC公钥加密方案的弱密钥
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_18
M. Bardet, V. Dragoi, Jean-Gabriel Luque, A. Otmani
{"title":"Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption Scheme","authors":"M. Bardet, V. Dragoi, Jean-Gabriel Luque, A. Otmani","doi":"10.1007/978-3-319-31517-1_18","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_18","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131665927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Authentication Key Recovery on Galois/Counter Mode (GCM) GCM模式下认证密钥恢复
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_7
J. Mattsson, M. Westerlund
{"title":"Authentication Key Recovery on Galois/Counter Mode (GCM)","authors":"J. Mattsson, M. Westerlund","doi":"10.1007/978-3-319-31517-1_7","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_7","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"80 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs 具有有限输入数的基于属性的全同态加密
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_16
Michael Clear, C. McGoldrick
{"title":"Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs","authors":"Michael Clear, C. McGoldrick","doi":"10.1007/978-3-319-31517-1_16","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_16","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware 在硬件中实现最佳区域性能权衡的极端流水线
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_8
S. Picek, Dominik Sisejkovic, D. Jakobović, L. Batina, Bohan Yang, Danilo Šijačić, N. Mentens
{"title":"Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware","authors":"S. Picek, Dominik Sisejkovic, D. Jakobović, L. Batina, Bohan Yang, Danilo Šijačić, N. Mentens","doi":"10.1007/978-3-319-31517-1_8","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_8","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132765450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order 素阶双线性群中具有子集差分撤销的自适应安全无限制属性加密
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_17
Pratish Datta, Ratna Dutta, S. Mukhopadhyay
{"title":"Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order","authors":"Pratish Datta, Ratna Dutta, S. Mukhopadhyay","doi":"10.1007/978-3-319-31517-1_17","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_17","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117179586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Software-Only Two-Factor Authentication Secure Against Active Servers 针对活动服务器的纯软件双因素认证安全
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_15
J. Bringer, H. Chabanne, Roch Lescuyer
{"title":"Software-Only Two-Factor Authentication Secure Against Active Servers","authors":"J. Bringer, H. Chabanne, Roch Lescuyer","doi":"10.1007/978-3-319-31517-1_15","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_15","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130015341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Security of the (F)HMQV Protocol (F)HMQV协议的安全性研究
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_11
Augustin P. Sarr, P. Elbaz-Vincent
{"title":"On the Security of the (F)HMQV Protocol","authors":"Augustin P. Sarr, P. Elbaz-Vincent","doi":"10.1007/978-3-319-31517-1_11","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_11","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123276608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack 二值误差下LWE的硬度:再论混合格约简和中间相遇攻击
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_2
J. Buchmann, Florian Göpfert, Rachel Player, T. Wunderer
{"title":"On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack","authors":"J. Buchmann, Florian Göpfert, Rachel Player, T. Wunderer","doi":"10.1007/978-3-319-31517-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_2","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming 安全计算中的证书验证及其在可验证线性规划中的应用
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_14
S. D. Hoogh, Berry Schoenmakers, Meilof Veeningen
{"title":"Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming","authors":"S. D. Hoogh, Berry Schoenmakers, Meilof Veeningen","doi":"10.1007/978-3-319-31517-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_14","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124195261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cryptanalysis of Some Protocols Using Matrices over Group Rings 群环上若干协议的矩阵密码分析
International Conference on Cryptology in Africa Pub Date : 2015-03-16 DOI: 10.1007/978-3-319-57339-7_13
Mohammad Eftekhari
{"title":"Cryptanalysis of Some Protocols Using Matrices over Group Rings","authors":"Mohammad Eftekhari","doi":"10.1007/978-3-319-57339-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_13","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130104353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信