{"title":"Human Public-Key Encryption","authors":"Houda Ferradi, R. Géraud, D. Naccache","doi":"10.1007/978-3-319-61273-7_26","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_26","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126158540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices","authors":"L. Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski","doi":"10.1007/978-3-319-61273-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_11","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"14 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators","authors":"M. Kulis, P. Lorek, Filip Zagórski","doi":"10.1007/978-3-319-61273-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_8","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114793643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware, Encryption, and Rerandomization - Everything Is Under Attack","authors":"Herman Galteland, Kristian Gjøsteen","doi":"10.1007/978-3-319-61273-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_12","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Beunardeau, Houda Ferradi, R. Géraud, D. Naccache
{"title":"Honey Encryption for Language - Robbing Shannon to Pay Turing?","authors":"M. Beunardeau, Houda Ferradi, R. Géraud, D. Naccache","doi":"10.1007/978-3-319-61273-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_7","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis","authors":"N. Courtois","doi":"10.1007/978-3-319-61273-7_27","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_27","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices","authors":"Veronika Kuchta, O. Markowitch","doi":"10.1007/978-3-319-61273-7_20","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_20","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-prover Interactive Proofs: Unsound Foundations","authors":"C. Crépeau, Nan Yang","doi":"10.1007/978-3-319-61273-7_25","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_25","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114062722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Herman Galteland, S. F. Mjølsnes, Ruxandra F. Olimid
{"title":"Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking","authors":"Herman Galteland, S. F. Mjølsnes, Ruxandra F. Olimid","doi":"10.1007/978-3-319-61273-7_22","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_22","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132009399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}