Annual International Cryptology Conference最新文献

筛选
英文 中文
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case 加密api的模块化处理:对称密钥情况
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53018-4_11
Thomas Shrimpton, Martijn Stam, B. Warinschi
{"title":"A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case","authors":"Thomas Shrimpton, Martijn Stam, B. Warinschi","doi":"10.1007/978-3-662-53018-4_11","DOIUrl":"https://doi.org/10.1007/978-3-662-53018-4_11","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices GF(2^n)中的轻量乘法及其在MDS矩阵中的应用
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53018-4_23
Christof Beierle, Thorsten Kranz, G. Leander
{"title":"Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices","authors":"Christof Beierle, Thorsten Kranz, G. Leander","doi":"10.1007/978-3-662-53018-4_23","DOIUrl":"https://doi.org/10.1007/978-3-662-53018-4_23","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131305217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials 代数和非代数陈述的有效零知识证明及其在隐私保护凭证中的应用
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53015-3_18
Melissa Chase, C. Ganesh, Payman Mohassel
{"title":"Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials","authors":"Melissa Chase, C. Ganesh, Payman Mohassel","doi":"10.1007/978-3-662-53015-3_18","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_18","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens 撤销令牌和属性令牌的模块化协议设计和应用的UC承诺
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53015-3_8
J. Camenisch, M. Dubovitskaya, A. Rial
{"title":"UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens","authors":"J. Camenisch, M. Dubovitskaya, A. Rial","doi":"10.1007/978-3-662-53015-3_8","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_8","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121368068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
New Insights on AES-Like SPN Ciphers 类aes SPN密码的新见解
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53018-4_22
Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, V. Rijmen
{"title":"New Insights on AES-Like SPN Ciphers","authors":"Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, V. Rijmen","doi":"10.1007/978-3-662-53018-4_22","DOIUrl":"https://doi.org/10.1007/978-3-662-53018-4_22","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127045141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming 在类型i中设计,在类型iii中运行:使用整数规划的快速可扩展双线性类型转换
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53015-3_14
Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo
{"title":"Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming","authors":"Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo","doi":"10.1007/978-3-662-53015-3_14","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_14","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"41 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133077038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers 反调整:可调整块密码的认证加密模式
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53018-4_2
Thomas Peyrin, Y. Seurin
{"title":"Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers","authors":"Thomas Peyrin, Y. Seurin","doi":"10.1007/978-3-662-53018-4_2","DOIUrl":"https://doi.org/10.1007/978-3-662-53018-4_2","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123888039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium 重新审视寻找纳什均衡的密码学难度
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53008-5_20
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
{"title":"Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium","authors":"Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan","doi":"10.1007/978-3-662-53008-5_20","DOIUrl":"https://doi.org/10.1007/978-3-662-53008-5_20","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122959120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Linicrypt: A Model for Practical Cryptography Linicrypt:一个实用密码学模型
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53015-3_15
Brent Carmer, Mike Rosulek
{"title":"Linicrypt: A Model for Practical Cryptography","authors":"Brent Carmer, Mike Rosulek","doi":"10.1007/978-3-662-53015-3_15","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_15","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124812252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Concurrent Non-Malleable Commitments (and More) in 3 Rounds 并发不可延展性承诺(及更多)在3轮
Annual International Cryptology Conference Pub Date : 2016-08-14 DOI: 10.1007/978-3-662-53015-3_10
Michele Ciampi, R. Ostrovsky, Luisa Siniscalchi, Ivan Visconti
{"title":"Concurrent Non-Malleable Commitments (and More) in 3 Rounds","authors":"Michele Ciampi, R. Ostrovsky, Luisa Siniscalchi, Ivan Visconti","doi":"10.1007/978-3-662-53015-3_10","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_10","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121216434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信