Annual International Cryptology Conference最新文献

筛选
英文 中文
Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem 利用3-异或问题对两轮偶数曼苏尔的低内存攻击
Annual International Cryptology Conference Pub Date : 2019-08-18 DOI: 10.1007/978-3-030-26951-7_8
G. Leurent, Ferdinand Sibleyras
{"title":"Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem","authors":"G. Leurent, Ferdinand Sibleyras","doi":"10.1007/978-3-030-26951-7_8","DOIUrl":"https://doi.org/10.1007/978-3-030-26951-7_8","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Slide Reduction, Revisited - Filling the Gaps in SVP Approximation 滑动减少,重访-填补SVP近似的空白
Annual International Cryptology Conference Pub Date : 2019-08-10 DOI: 10.1007/978-3-030-56880-1_10
Divesh Aggarwal, Jianwei Li, Phong Q. Nguyen, Noah Stephens-Davidowitz
{"title":"Slide Reduction, Revisited - Filling the Gaps in SVP Approximation","authors":"Divesh Aggarwal, Jianwei Li, Phong Q. Nguyen, Noah Stephens-Davidowitz","doi":"10.1007/978-3-030-56880-1_10","DOIUrl":"https://doi.org/10.1007/978-3-030-56880-1_10","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132293149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks 基于置换网络的(可调)分组密码的可证明安全性
Annual International Cryptology Conference Pub Date : 2018-08-19 DOI: 10.1007/978-3-319-96884-1_24
Benoît Cogliati, Y. Dodis, Jonathan Katz, Jooyoung Lee, J. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang
{"title":"Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks","authors":"Benoît Cogliati, Y. Dodis, Jonathan Katz, Jooyoung Lee, J. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang","doi":"10.1007/978-3-319-96884-1_24","DOIUrl":"https://doi.org/10.1007/978-3-319-96884-1_24","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"242 1‐2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Towards Bidirectional Ratcheted Key Exchange 双向棘轮密钥交换
Annual International Cryptology Conference Pub Date : 2018-08-19 DOI: 10.1007/978-3-319-96884-1_1
Bertram Poettering, Paul Rösler
{"title":"Towards Bidirectional Ratcheted Key Exchange","authors":"Bertram Poettering, Paul Rösler","doi":"10.1007/978-3-319-96884-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-96884-1_1","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"26 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133248767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited 量子随机Oracle模型中的ind - cca安全密钥封装机制,重访
Annual International Cryptology Conference Pub Date : 2018-08-19 DOI: 10.1007/978-3-319-96878-0_4
Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
{"title":"IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited","authors":"Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma","doi":"10.1007/978-3-319-96878-0_4","DOIUrl":"https://doi.org/10.1007/978-3-319-96878-0_4","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124131925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Constrained PRFs for mathrmNC^1 in Traditional Groups 传统群中 mathmnc ^1的约束prf
Annual International Cryptology Conference Pub Date : 2018-08-19 DOI: 10.1007/978-3-319-96881-0_19
Nuttapong Attrapadung, Takahiro Matsuda, R. Nishimaki, Shota Yamada, Takashi Yamakawa
{"title":"Constrained PRFs for mathrmNC^1 in Traditional Groups","authors":"Nuttapong Attrapadung, Takahiro Matsuda, R. Nishimaki, Shota Yamada, Takashi Yamakawa","doi":"10.1007/978-3-319-96881-0_19","DOIUrl":"https://doi.org/10.1007/978-3-319-96881-0_19","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem 基于NTRU问题的GGH13多线性映射上分支程序混淆的密码分析
Annual International Cryptology Conference Pub Date : 2018-08-19 DOI: 10.1007/978-3-319-96878-0_7
J. Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
{"title":"Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem","authors":"J. Cheon, Minki Hhan, Jiseung Kim, Changmin Lee","doi":"10.1007/978-3-319-96878-0_7","DOIUrl":"https://doi.org/10.1007/978-3-319-96878-0_7","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126583327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cryptanalysis via Algebraic Spans 通过代数跨度进行密码分析
Annual International Cryptology Conference Pub Date : 2018-08-19 DOI: 10.1007/978-3-319-96884-1_9
Adi Ben-Zvi, A. Kalka, B. Tsaban
{"title":"Cryptanalysis via Algebraic Spans","authors":"Adi Ben-Zvi, A. Kalka, B. Tsaban","doi":"10.1007/978-3-319-96884-1_9","DOIUrl":"https://doi.org/10.1007/978-3-319-96884-1_9","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114843056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Fast Message Franking: From Invisible Salamanders to Encryptment 快速信息加密:从看不见的火蜥蜴到加密
Annual International Cryptology Conference Pub Date : 2018-08-19 DOI: 10.1007/978-3-319-96884-1_6
Y. Dodis, Paul Grubbs, T. Ristenpart, Joanne Woodage
{"title":"Fast Message Franking: From Invisible Salamanders to Encryptment","authors":"Y. Dodis, Paul Grubbs, T. Ristenpart, Joanne Woodage","doi":"10.1007/978-3-319-96884-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-96884-1_6","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Combiners for Backdoored Random Oracles 后门随机预言机的组合器
Annual International Cryptology Conference Pub Date : 2018-08-19 DOI: 10.1007/978-3-319-96881-0_10
B. Bauer, P. Farshim, Sogol Mazaheri
{"title":"Combiners for Backdoored Random Oracles","authors":"B. Bauer, P. Farshim, Sogol Mazaheri","doi":"10.1007/978-3-319-96881-0_10","DOIUrl":"https://doi.org/10.1007/978-3-319-96881-0_10","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121494005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信