Annual International Cryptology Conference最新文献

筛选
英文 中文
Broadcast and Trace with N^ε Ciphertext Size from Standard Assumptions 基于标准假设的N^ε密文大小的广播和跟踪
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26954-8_27
Rishab Goyal, Willy Quach, Brent Waters, D. Wichs
{"title":"Broadcast and Trace with N^ε Ciphertext Size from Standard Assumptions","authors":"Rishab Goyal, Willy Quach, Brent Waters, D. Wichs","doi":"10.1007/978-3-030-26954-8_27","DOIUrl":"https://doi.org/10.1007/978-3-030-26954-8_27","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"475 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126131307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning 利用深度学习改进对Round-Reduced Speck32/64的攻击
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26951-7_6
A. Gohr
{"title":"Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning","authors":"A. Gohr","doi":"10.1007/978-3-030-26951-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-26951-7_6","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116561886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 106
Scalable Zero Knowledge with No Trusted Setup 可扩展的零知识与不受信任的设置
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26954-8_23
Eli Ben-Sasson, Iddo Bentov, Y. Horesh, Michael Riabzev
{"title":"Scalable Zero Knowledge with No Trusted Setup","authors":"Eli Ben-Sasson, Iddo Bentov, Y. Horesh, Michael Riabzev","doi":"10.1007/978-3-030-26954-8_23","DOIUrl":"https://doi.org/10.1007/978-3-030-26954-8_23","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 167
Memory-Hard Functions from Cryptographic Primitives 来自加密原语的内存硬函数
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26951-7_19
Binyi Chen, Stefano Tessaro
{"title":"Memory-Hard Functions from Cryptographic Primitives","authors":"Binyi Chen, Stefano Tessaro","doi":"10.1007/978-3-030-26951-7_19","DOIUrl":"https://doi.org/10.1007/978-3-030-26951-7_19","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130179476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs 基于全线性pcp的秘密共享数据零知识证明
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26954-8_3
D. Boneh, Elette Boyle, Henry Corrigan-Gibbs, N. Gilboa, Y. Ishai
{"title":"Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs","authors":"D. Boneh, Elette Boyle, Henry Corrigan-Gibbs, N. Gilboa, Y. Ishai","doi":"10.1007/978-3-030-26954-8_3","DOIUrl":"https://doi.org/10.1007/978-3-030-26954-8_3","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116488835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full mathsf MORUS 二次布尔函数的相关性:所有版本Full mathsf MORUS的密码分析
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26951-7_7
Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, L. Hu
{"title":"Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full mathsf MORUS","authors":"Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, L. Hu","doi":"10.1007/978-3-030-26951-7_7","DOIUrl":"https://doi.org/10.1007/978-3-030-26951-7_7","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128180462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Universally Composable Secure Computation with Corrupted Tokens 带有损坏令牌的普遍可组合安全计算
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26954-8_14
Nishanth Chandran, Wutichai Chongchitmate, R. Ostrovsky, Ivan Visconti
{"title":"Universally Composable Secure Computation with Corrupted Tokens","authors":"Nishanth Chandran, Wutichai Chongchitmate, R. Ostrovsky, Ivan Visconti","doi":"10.1007/978-3-030-26954-8_14","DOIUrl":"https://doi.org/10.1007/978-3-030-26954-8_14","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115608585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Subvector Commitments with Application to Succinct Arguments 应用于简洁论证的子向量承诺
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26948-7_19
Russell W. F. Lai, Giulio Malavolta
{"title":"Subvector Commitments with Application to Succinct Arguments","authors":"Russell W. F. Lai, Giulio Malavolta","doi":"10.1007/978-3-030-26948-7_19","DOIUrl":"https://doi.org/10.1007/978-3-030-26948-7_19","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125612912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Explicit Rate-1 Non-malleable Codes for Local Tampering 局部篡改的显式率-1不可延展性代码
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26948-7_16
Divya Gupta, H. K. Maji, Mingyuan Wang
{"title":"Explicit Rate-1 Non-malleable Codes for Local Tampering","authors":"Divya Gupta, H. K. Maji, Mingyuan Wang","doi":"10.1007/978-3-030-26948-7_16","DOIUrl":"https://doi.org/10.1007/978-3-030-26948-7_16","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
It Wasn't Me! - Repudiability and Claimability of Ring Signatures 不是我!-环签名的可抵赖性和可索赔性
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26954-8_6
Sunoo Park, Adam Sealfon
{"title":"It Wasn't Me! - Repudiability and Claimability of Ring Signatures","authors":"Sunoo Park, Adam Sealfon","doi":"10.1007/978-3-030-26954-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-26954-8_6","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129796305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信