Annual International Cryptology Conference最新文献

筛选
英文 中文
Fast Reduction of Algebraic Lattices over Cyclotomic Fields 分环场上代数格的快速约简
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56880-1_6
P. Kirchner, Thomas Espitau, Pierre-Alain Fouque
{"title":"Fast Reduction of Algebraic Lattices over Cyclotomic Fields","authors":"P. Kirchner, Thomas Espitau, Pierre-Alain Fouque","doi":"10.1007/978-3-030-56880-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-56880-1_6","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Compressed $varSigma $-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics 压缩$varSigma $-即插即用安全算法的协议理论和实际应用
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56877-1_18
T. Attema, R. Cramer
{"title":"Compressed $varSigma $-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics","authors":"T. Attema, R. Cramer","doi":"10.1007/978-3-030-56877-1_18","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_18","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134421301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers 恶意框架:嵌入后门到可调整的块密码
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56877-1_9
Thomas Peyrin, Haoyang Wang
{"title":"The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers","authors":"Thomas Peyrin, Haoyang Wang","doi":"10.1007/978-3-030-56877-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_9","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115747440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust 零知识的新技术:利用低效的证明来减少假设、交互和信任
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56877-1_24
Marshall Ball, D. Dachman-Soled, Mukul Kulkarni
{"title":"New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust","authors":"Marshall Ball, D. Dachman-Soled, Mukul Kulkarni","doi":"10.1007/978-3-030-56877-1_24","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_24","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fast and Secure Updatable Encryption 快速和安全的可更新加密
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56784-2_16
C. Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
{"title":"Fast and Secure Updatable Encryption","authors":"C. Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang","doi":"10.1007/978-3-030-56784-2_16","DOIUrl":"https://doi.org/10.1007/978-3-030-56784-2_16","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132763843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Delegation with Updatable Unambiguous Proofs and PPAD-Hardness 具有可更新的明确证明和ppad -硬度的委托
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56877-1_23
Y. Kalai, Omer Paneth, Lisa Yang
{"title":"Delegation with Updatable Unambiguous Proofs and PPAD-Hardness","authors":"Y. Kalai, Omer Paneth, Lisa Yang","doi":"10.1007/978-3-030-56877-1_23","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_23","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133836404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model 泄漏单元探测模型中加密多映射和可搜索加密的下界
Annual International Cryptology Conference Pub Date : 2020-08-17 DOI: 10.1007/978-3-030-56784-2_15
Sarvar Patel, G. Persiano, Kevin Yeo
{"title":"Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model","authors":"Sarvar Patel, G. Persiano, Kevin Yeo","doi":"10.1007/978-3-030-56784-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-56784-2_15","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"734 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121803827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Improved Torsion-Point Attacks on SIDH Variants 改进了SIDH变体的扭转点攻击
Annual International Cryptology Conference Pub Date : 2020-05-29 DOI: 10.1007/978-3-030-84252-9_15
Victoria de Quehen, Péter Kutas, Christopher Leonardi, C. Martindale, Lorenz Panny, C. Petit, Katherine E. Stange
{"title":"Improved Torsion-Point Attacks on SIDH Variants","authors":"Victoria de Quehen, Péter Kutas, Christopher Leonardi, C. Martindale, Lorenz Panny, C. Petit, Katherine E. Stange","doi":"10.1007/978-3-030-84252-9_15","DOIUrl":"https://doi.org/10.1007/978-3-030-84252-9_15","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134532376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Cryptanalytic Extraction of Neural Network Models 神经网络模型的密码分析提取
Annual International Cryptology Conference Pub Date : 2020-03-10 DOI: 10.1007/978-3-030-56877-1_7
Nicholas Carlini, Matthew Jagielski, Ilya Mironov
{"title":"Cryptanalytic Extraction of Neural Network Models","authors":"Nicholas Carlini, Matthew Jagielski, Ilya Mironov","doi":"10.1007/978-3-030-56877-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_7","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125712935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
Non-interactive zero-knowledge arguments for QMA, with preprocessing QMA的非交互式零知识参数,经过预处理
Annual International Cryptology Conference Pub Date : 2019-11-18 DOI: 10.1007/978-3-030-56877-1_28
Andrea Coladangelo, Thomas Vidick, Tina Zhang
{"title":"Non-interactive zero-knowledge arguments for QMA, with preprocessing","authors":"Andrea Coladangelo, Thomas Vidick, Tina Zhang","doi":"10.1007/978-3-030-56877-1_28","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_28","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123066362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信