Annual International Cryptology Conference最新文献

筛选
英文 中文
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication ZMAC:用于高度安全消息认证的快速可调分组密码模式
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63697-9_2
Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Y. Seurin
{"title":"ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication","authors":"Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Y. Seurin","doi":"10.1007/978-3-319-63697-9_2","DOIUrl":"https://doi.org/10.1007/978-3-319-63697-9_2","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
From Obfuscation to the Security of Fiat-Shamir for Proofs 从模糊到法-沙米尔证明的安全性
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63715-0_8
Y. Kalai, G. Rothblum, R. Rothblum
{"title":"From Obfuscation to the Security of Fiat-Shamir for Proofs","authors":"Y. Kalai, G. Rothblum, R. Rothblum","doi":"10.1007/978-3-319-63715-0_8","DOIUrl":"https://doi.org/10.1007/978-3-319-63715-0_8","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116319827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Generic Transformations of Predicate Encodings: Constructions and Applications 谓词编码的一般转换:构造和应用
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63688-7_2
Miguel Ambrona, G. Barthe, Benedikt Schmidt
{"title":"Generic Transformations of Predicate Encodings: Constructions and Applications","authors":"Miguel Ambrona, G. Barthe, Benedikt Schmidt","doi":"10.1007/978-3-319-63688-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-63688-7_2","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks NMAC及相关结构的量子安全——PRF域扩展抗量子攻击
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63715-0_10
F. Song, Aaram Yun
{"title":"Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks","authors":"F. Song, Aaram Yun","doi":"10.1007/978-3-319-63715-0_10","DOIUrl":"https://doi.org/10.1007/978-3-319-63715-0_10","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134067157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks 可重用乱码电路的更强安全性,一般定义和攻击
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63688-7_1
Shweta Agrawal
{"title":"Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks","authors":"Shweta Agrawal","doi":"10.1007/978-3-319-63688-7_1","DOIUrl":"https://doi.org/10.1007/978-3-319-63688-7_1","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114635498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
The Bitcoin Backbone Protocol with Chains of Variable Difficulty 可变难度链的比特币主干协议
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63688-7_10
J. Garay, A. Kiayias, Nikos Leonardos
{"title":"The Bitcoin Backbone Protocol with Chains of Variable Difficulty","authors":"J. Garay, A. Kiayias, Nikos Leonardos","doi":"10.1007/978-3-319-63688-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-63688-7_10","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131022680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 246
Kurosawa-Desmedt Meets Tight Security 黑泽明首相遭遇严密安保
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63697-9_5
Romain Gay, D. Hofheinz, Lisa Kohl
{"title":"Kurosawa-Desmedt Meets Tight Security","authors":"Romain Gay, D. Hofheinz, Lisa Kohl","doi":"10.1007/978-3-319-63697-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-63697-9_5","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121739249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Four-Round Concurrent Non-Malleable Commitments from One-Way Functions 单向函数的四轮并发不可延性承诺
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63715-0_5
Michele Ciampi, R. Ostrovsky, Luisa Siniscalchi, Ivan Visconti
{"title":"Four-Round Concurrent Non-Malleable Commitments from One-Way Functions","authors":"Michele Ciampi, R. Ostrovsky, Luisa Siniscalchi, Ivan Visconti","doi":"10.1007/978-3-319-63715-0_5","DOIUrl":"https://doi.org/10.1007/978-3-319-63715-0_5","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing 一种新的分布敏感安全草图和流行比例哈希
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63697-9_23
Joanne Woodage, Rahul Chatterjee, Y. Dodis, A. Juels, T. Ristenpart
{"title":"A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing","authors":"Joanne Woodage, Rahul Chatterjee, Y. Dodis, A. Juels, T. Ristenpart","doi":"10.1007/978-3-319-63697-9_23","DOIUrl":"https://doi.org/10.1007/978-3-319-63697-9_23","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs 基于三线性映射和块方向局部PRGs的不可区分混淆
Annual International Cryptology Conference Pub Date : 2017-08-20 DOI: 10.1007/978-3-319-63688-7_21
Huijia Lin, Stefano Tessaro
{"title":"Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs","authors":"Huijia Lin, Stefano Tessaro","doi":"10.1007/978-3-319-63688-7_21","DOIUrl":"https://doi.org/10.1007/978-3-319-63688-7_21","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132698555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 106
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信