International Conference on Cryptology and Information Security in Latin America最新文献

筛选
英文 中文
How Leaky Is an Extractor? 萃取器有多漏水?
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_18
François-Xavier Standaert
{"title":"How Leaky Is an Extractor?","authors":"François-Xavier Standaert","doi":"10.1007/978-3-642-14712-8_18","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_18","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Lattice-Based Threshold Ring Signature Scheme 基于格的阈值环签名方案
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_16
Pierre-Louis Cayrel, Richard Lindner, M. Rückert, Rosemberg Silva
{"title":"A Lattice-Based Threshold Ring Signature Scheme","authors":"Pierre-Louis Cayrel, Richard Lindner, M. Rückert, Rosemberg Silva","doi":"10.1007/978-3-642-14712-8_16","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_16","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121587819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Defeating Any Secret Cryptography with SCARE Attacks 用SCARE攻击击败任何秘密密码术
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_17
S. Guilley, L. Sauvage, Julien Micolod, Denis Réal, F. Valette
{"title":"Defeating Any Secret Cryptography with SCARE Attacks","authors":"S. Guilley, L. Sauvage, Julien Micolod, Denis Réal, F. Valette","doi":"10.1007/978-3-642-14712-8_17","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_17","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Broadcast Encryption with Multiple Trust Authorities 具有多个信任机构的广播加密
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_1
K. D. Boklan, A. Dent, Christopher A. Seaman
{"title":"Broadcast Encryption with Multiple Trust Authorities","authors":"K. D. Boklan, A. Dent, Christopher A. Seaman","doi":"10.1007/978-3-642-14712-8_1","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_1","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication Optimal Multi-valued Asynchronous Broadcast Protocol 通信最优多值异步广播协议
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_10
A. Patra, C. Rangan
{"title":"Communication Optimal Multi-valued Asynchronous Broadcast Protocol","authors":"A. Patra, C. Rangan","doi":"10.1007/978-3-642-14712-8_10","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_10","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126179615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Generic Attacks on Misty Schemes 对模糊方案的一般攻击
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_14
Valérie Nachef, J. Patarin, J. Treger
{"title":"Generic Attacks on Misty Schemes","authors":"Valérie Nachef, J. Patarin, J. Treger","doi":"10.1007/978-3-642-14712-8_14","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_14","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130114303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations 基于单向置换的零知识证明的轮复杂度
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_12
S. Dov Gordon, H. Wee, David Xiao, Arkady Yerukhimovich
{"title":"On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations","authors":"S. Dov Gordon, H. Wee, David Xiao, Arkady Yerukhimovich","doi":"10.1007/978-3-642-14712-8_12","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_12","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114760309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Accelerating Lattice Reduction with FPGAs 用fpga加速格化简
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_8
J. Detrey, G. Hanrot, X. Pujol, D. Stehlé
{"title":"Accelerating Lattice Reduction with FPGAs","authors":"J. Detrey, G. Hanrot, X. Pujol, D. Stehlé","doi":"10.1007/978-3-642-14712-8_8","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_8","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124584310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Combined Implementation Attack Resistant Exponentiation 组合实现抗攻击幂
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_19
Jörn-Marc Schmidt, Michael Tunstall, R. Avanzi, Ilya Kizhvatov, Timo Kasper, David F. Oswald
{"title":"Combined Implementation Attack Resistant Exponentiation","authors":"Jörn-Marc Schmidt, Michael Tunstall, R. Avanzi, Ilya Kizhvatov, Timo Kasper, David F. Oswald","doi":"10.1007/978-3-642-14712-8_19","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_19","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves 椭圆曲线的确定性哈希函数图像大小估计
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_5
Pierre-Alain Fouque, Mehdi Tibouchi
{"title":"Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves","authors":"Pierre-Alain Fouque, Mehdi Tibouchi","doi":"10.1007/978-3-642-14712-8_5","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_5","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124268411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书