International Conference on Cryptology in Malaysia最新文献

筛选
英文 中文
Time for a Paradigm Shift in Our Disciplinary Culture? 是时候在我们的学科文化中进行范式转换了?
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_2
N. Koblitz
{"title":"Time for a Paradigm Shift in Our Disciplinary Culture?","authors":"N. Koblitz","doi":"10.1007/978-3-319-61273-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_2","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control CARIBE:级联IBE最大的灵活性和用户侧控制
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_19
Britta Hale, Christopher Carr, D. Gligoroski
{"title":"CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control","authors":"Britta Hale, Christopher Carr, D. Gligoroski","doi":"10.1007/978-3-319-61273-7_19","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_19","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115889085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions 安全计算两位输出函数的必要和足够的卡数
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_10
Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, T. Mizuki, H. Sone
{"title":"Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions","authors":"Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, T. Mizuki, H. Sone","doi":"10.1007/978-3-319-61273-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_10","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122099722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks 基于链接的组签名撤销:一种有效撤销检查的实用方法
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_18
Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
{"title":"Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks","authors":"Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer","doi":"10.1007/978-3-319-61273-7_18","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_18","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132351191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
From Higher-Order Differentials to Polytopic Cryptyanalysis 从高阶微分到多向隐式分析
International Conference on Cryptology in Malaysia Pub Date : 2016-12-01 DOI: 10.1007/978-3-319-61273-7_29
Tyge Tiessen
{"title":"From Higher-Order Differentials to Polytopic Cryptyanalysis","authors":"Tyge Tiessen","doi":"10.1007/978-3-319-61273-7_29","DOIUrl":"https://doi.org/10.1007/978-3-319-61273-7_29","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121487104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity 引入一种新的快速代数攻击方法并最小化其连续数据复杂度
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_3
Frederik Armknecht, G. Ars
{"title":"Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity","authors":"Frederik Armknecht, G. Ars","doi":"10.1007/11554868_3","DOIUrl":"https://doi.org/10.1007/11554868_3","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129164543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
On Session Key Construction in Provably-Secure Key Establishment Protocols 可证明安全密钥建立协议中的会话密钥构造
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_9
Kim-Kwang Raymond Choo, C. Boyd, Yvonne Hitchcock
{"title":"On Session Key Construction in Provably-Secure Key Establishment Protocols","authors":"Kim-Kwang Raymond Choo, C. Boyd, Yvonne Hitchcock","doi":"10.1007/11554868_9","DOIUrl":"https://doi.org/10.1007/11554868_9","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"52 s181","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120831483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Identity Based Delegation Network 基于身份的委托网络
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_8
Sherman S. M. Chow, R. Lui, L. Hui, S. Yiu
{"title":"Identity Based Delegation Network","authors":"Sherman S. M. Chow, R. Lui, L. Hui, S. Yiu","doi":"10.1007/11554868_8","DOIUrl":"https://doi.org/10.1007/11554868_8","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security of Two-Party Identity-Based Key Agreement 基于身份的双方密钥协议的安全性
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_17
C. Boyd, Kim-Kwang Raymond Choo
{"title":"Security of Two-Party Identity-Based Key Agreement","authors":"C. Boyd, Kim-Kwang Raymond Choo","doi":"10.1007/11554868_17","DOIUrl":"https://doi.org/10.1007/11554868_17","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128007881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Equivalent Keys in HFE, C*, and Variations 等价键在HFE, C*,和变化
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_4
Christopher Wolf, B. Preneel
{"title":"Equivalent Keys in HFE, C*, and Variations","authors":"Christopher Wolf, B. Preneel","doi":"10.1007/11554868_4","DOIUrl":"https://doi.org/10.1007/11554868_4","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125748228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信