International Conference on Cryptology in Africa最新文献

筛选
英文 中文
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting 将柳巴舍夫斯基的签名方案应用于环签名设置
International Conference on Cryptology in Africa Pub Date : 2013-06-22 DOI: 10.1007/978-3-642-38553-7_1
C. A. Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, P. Gaborit
{"title":"Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting","authors":"C. A. Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, P. Gaborit","doi":"10.1007/978-3-642-38553-7_1","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_1","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127201090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
An Attack on RSA Using LSBs of Multiples of the Prime Factors 利用质因数倍数的lsdb对RSA的攻击
International Conference on Cryptology in Africa Pub Date : 2013-06-22 DOI: 10.1007/978-3-642-38553-7_17
Abderrahmane Nitaj
{"title":"An Attack on RSA Using LSBs of Multiples of the Prime Factors","authors":"Abderrahmane Nitaj","doi":"10.1007/978-3-642-38553-7_17","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_17","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130442696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority 针对隐蔽多数的算术电路的高效多方计算
International Conference on Cryptology in Africa Pub Date : 2013-06-22 DOI: 10.1007/978-3-642-38553-7_15
Isheeta Nargis, Payman Mohassel, W. Eberly
{"title":"Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority","authors":"Isheeta Nargis, Payman Mohassel, W. Eberly","doi":"10.1007/978-3-642-38553-7_15","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_15","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123003157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs 在gpu上使用自动调谐框架的Salsa20流密码的新速度记录
International Conference on Cryptology in Africa Pub Date : 2013-06-22 DOI: 10.1007/978-3-642-38553-7_11
A. Khalid, G. Paul, A. Chattopadhyay
{"title":"New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs","authors":"A. Khalid, G. Paul, A. Chattopadhyay","doi":"10.1007/978-3-642-38553-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_11","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Triple-Base Number System for Scalar Multiplication 标量乘法的三基数系统
International Conference on Cryptology in Africa Pub Date : 2013-06-22 DOI: 10.1007/978-3-642-38553-7_26
Wei Yu, Kunpeng Wang, Bao Li, Song Tian
{"title":"Triple-Base Number System for Scalar Multiplication","authors":"Wei Yu, Kunpeng Wang, Bao Li, Song Tian","doi":"10.1007/978-3-642-38553-7_26","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_26","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers 流密码的时间-内存权衡攻击比较
International Conference on Cryptology in Africa Pub Date : 2013-06-22 DOI: 10.1007/978-3-642-38553-7_24
F. V. D. Broek, E. Poll
{"title":"A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers","authors":"F. V. D. Broek, E. Poll","doi":"10.1007/978-3-642-38553-7_24","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_24","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Sieving for Shortest Vectors in Ideal Lattices 理想格中最短向量的筛分
International Conference on Cryptology in Africa Pub Date : 2013-06-22 DOI: 10.1007/978-3-642-38553-7_22
Michael Schneider
{"title":"Sieving for Shortest Vectors in Ideal Lattices","authors":"Michael Schneider","doi":"10.1007/978-3-642-38553-7_22","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_22","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems 基于LPN和决策最小距离问题的公钥密码体制
International Conference on Cryptology in Africa Pub Date : 2013-06-22 DOI: 10.1007/978-3-642-38553-7_6
Alexandre Duc, S. Vaudenay
{"title":"HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems","authors":"Alexandre Duc, S. Vaudenay","doi":"10.1007/978-3-642-38553-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_6","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Homomorphic Encryption with Access Policies: Characterization and New Constructions 具有访问策略的同态加密:表征和新结构
International Conference on Cryptology in Africa Pub Date : 2013-02-05 DOI: 10.1007/978-3-642-38553-7_4
Michael Clear, Arthur P. Hughes, H. Tewari
{"title":"Homomorphic Encryption with Access Policies: Characterization and New Constructions","authors":"Michael Clear, Arthur P. Hughes, H. Tewari","doi":"10.1007/978-3-642-38553-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_4","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A New Attack on RSA and CRT-RSA RSA和CRT-RSA的新攻击
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_14
Abderrahmane Nitaj
{"title":"A New Attack on RSA and CRT-RSA","authors":"Abderrahmane Nitaj","doi":"10.1007/978-3-642-31410-0_14","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_14","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121260852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信