International Conference on Cryptology in Malaysia最新文献

筛选
英文 中文
Human Public-Key Encryption 人类公钥加密
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_26
Houda Ferradi, R. Géraud, D. Naccache
{"title":"Human Public-Key Encryption","authors":"Houda Ferradi, R. Géraud, D. Naccache","doi":"10.1007/978-3-319-61273-7_26","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_26","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126158540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices 可控随机性——对加密设备后门的防御
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_11
L. Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski
{"title":"Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices","authors":"L. Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski","doi":"10.1007/978-3-319-61273-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_11","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"14 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators 随机停止时间和可证明安全的伪随机置换发生器
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_8
M. Kulis, P. Lorek, Filip Zagórski
{"title":"Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators","authors":"M. Kulis, P. Lorek, Filip Zagórski","doi":"10.1007/978-3-319-61273-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_8","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114793643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malware, Encryption, and Rerandomization - Everything Is Under Attack 恶意软件,加密和再随机化-一切都在攻击之下
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_12
Herman Galteland, Kristian Gjøsteen
{"title":"Malware, Encryption, and Rerandomization - Everything Is Under Attack","authors":"Herman Galteland, Kristian Gjøsteen","doi":"10.1007/978-3-319-61273-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_12","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Honey Encryption for Language - Robbing Shannon to Pay Turing? 语言的蜂蜜加密——抢香农付钱给图灵?
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_7
M. Beunardeau, Houda Ferradi, R. Géraud, D. Naccache
{"title":"Honey Encryption for Language - Robbing Shannon to Pay Turing?","authors":"M. Beunardeau, Houda Ferradi, R. Géraud, D. Naccache","doi":"10.1007/978-3-319-61273-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_7","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis 代数密码分析中求解非线性方程的两种哲学
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_27
N. Courtois
{"title":"Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis","authors":"N. Courtois","doi":"10.1007/978-3-319-61273-7_27","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_27","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Watermarking Cryptographic Programs 水印加密程序
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_28
R. Nishimaki
{"title":"Watermarking Cryptographic Programs","authors":"R. Nishimaki","doi":"10.1007/978-3-319-61273-7_28","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_28","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132807481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices 基于多权威分布式属性的加密及其在格上可搜索加密中的应用
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_20
Veronika Kuchta, O. Markowitch
{"title":"Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices","authors":"Veronika Kuchta, O. Markowitch","doi":"10.1007/978-3-319-61273-7_20","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_20","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Multi-prover Interactive Proofs: Unsound Foundations 多证明者交互证明:不健全的基础
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_25
C. Crépeau, Nan Yang
{"title":"Multi-prover Interactive Proofs: Unsound Foundations","authors":"C. Crépeau, Nan Yang","doi":"10.1007/978-3-319-61273-7_25","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_25","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114062722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking 对基本cMix设计的攻击:论承诺和随机部分检验的必要性
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_22
Herman Galteland, S. F. Mjølsnes, Ruxandra F. Olimid
{"title":"Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking","authors":"Herman Galteland, S. F. Mjølsnes, Ruxandra F. Olimid","doi":"10.1007/978-3-319-61273-7_22","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_22","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132009399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信