Annual International Cryptology Conference最新文献

筛选
英文 中文
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract) 带条件掩蔽的蓝牙加密的实时密码分析-(扩展摘要)
Annual International Cryptology Conference Pub Date : 2018-04-01 DOI: 10.1007/978-3-642-40041-4_10
Bin Zhang, Chaohao Xu, D. Feng
{"title":"Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract)","authors":"Bin Zhang, Chaohao Xu, D. Feng","doi":"10.1007/978-3-642-40041-4_10","DOIUrl":"https://doi.org/10.1007/978-3-642-40041-4_10","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116393450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Be Adaptive, Avoid Overcommitting 适应性强,避免过度投入
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63688-7_5
Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, D. Wichs
{"title":"Be Adaptive, Avoid Overcommitting","authors":"Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, D. Wichs","doi":"10.1007/978-3-319-63688-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-63688-7_5","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128465891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Identity-Based Encryption from Codes with Rank Metric 基于身份的秩度量码加密
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63697-9_7
P. Gaborit, A. Hauteville, D. Phan, J. Tillich
{"title":"Identity-Based Encryption from Codes with Rank Metric","authors":"P. Gaborit, A. Hauteville, D. Phan, J. Tillich","doi":"10.1007/978-3-319-63697-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-63697-9_7","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128577239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Boosting Authenticated Encryption Robustness with Minimal Modifications 用最小的修改提高认证加密的稳健性
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63697-9_1
T. Ashur, O. Dunkelman, Atul Luykx
{"title":"Boosting Authenticated Encryption Robustness with Minimal Modifications","authors":"T. Ashur, O. Dunkelman, Atul Luykx","doi":"10.1007/978-3-319-63697-9_1","DOIUrl":"https://doi.org/10.1007/978-3-319-63697-9_1","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124243655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme MTP工作量证明方案的时间-内存权衡攻击
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63715-0_13
Itai Dinur, Niv Nadler
{"title":"Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme","authors":"Itai Dinur, Niv Nadler","doi":"10.1007/978-3-319-63715-0_13","DOIUrl":"https://doi.org/10.1007/978-3-319-63715-0_13","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132233101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Information-Theoretic Indistinguishability via the Chi-Squared Method 基于卡方方法的信息论不可分辨性
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63697-9_17
Wei Dai, V. Hoang, Stefano Tessaro
{"title":"Information-Theoretic Indistinguishability via the Chi-Squared Method","authors":"Wei Dai, V. Hoang, Stefano Tessaro","doi":"10.1007/978-3-319-63697-9_17","DOIUrl":"https://doi.org/10.1007/978-3-319-63697-9_17","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130872358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Conditional Disclosure of Secrets via Non-linear Reconstruction 基于非线性重构的秘密条件披露
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63688-7_25
Tianren Liu, V. Vaikuntanathan, H. Wee
{"title":"Conditional Disclosure of Secrets via Non-linear Reconstruction","authors":"Tianren Liu, V. Vaikuntanathan, H. Wee","doi":"10.1007/978-3-319-63688-7_25","DOIUrl":"https://doi.org/10.1007/978-3-319-63688-7_25","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Secure Computation Based on Leaky Correlations: High Resilience Setting 基于泄漏相关性的安全计算:高弹性设置
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63715-0_1
Alexander R. Block, H. K. Maji, H. Nguyen
{"title":"Secure Computation Based on Leaky Correlations: High Resilience Setting","authors":"Alexander R. Block, H. K. Maji, H. Nguyen","doi":"10.1007/978-3-319-63715-0_1","DOIUrl":"https://doi.org/10.1007/978-3-319-63715-0_1","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Ratcheted Encryption and Key Exchange: The Security of Messaging 棘轮加密和密钥交换:消息传递的安全性
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63697-9_21
M. Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs
{"title":"Ratcheted Encryption and Key Exchange: The Security of Messaging","authors":"M. Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs","doi":"10.1007/978-3-319-63697-9_21","DOIUrl":"https://doi.org/10.1007/978-3-319-63697-9_21","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122947564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited 用于两方安全计算的TinyTable协议,或:重新访问门置乱
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63688-7_6
I. Damgård, J. Nielsen, Michael Nielsen, Samuel Ranellucci
{"title":"The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited","authors":"I. Damgård, J. Nielsen, Michael Nielsen, Samuel Ranellucci","doi":"10.1007/978-3-319-63688-7_6","DOIUrl":"https://doi.org/10.1007/978-3-319-63688-7_6","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114247543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信