International Conference on Cryptology in Malaysia最新文献

筛选
英文 中文
Homomorphic Cryptosystems Based on Subgroup Membership Problems 基于子群隶属性问题的同态密码系统
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_22
Kristian Gjøsteen
{"title":"Homomorphic Cryptosystems Based on Subgroup Membership Problems","authors":"Kristian Gjøsteen","doi":"10.1007/11554868_22","DOIUrl":"https://doi.org/10.1007/11554868_22","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124934340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption 利用所选消息和内部冲突进行功率分析——rsa解密检查机制的漏洞
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_13
Sung-Ming Yen, Wei-Chih Lien, S. Moon, JaeCheol Ha
{"title":"Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption","authors":"Sung-Ming Yen, Wei-Chih Lien, S. Moon, JaeCheol Ha","doi":"10.1007/11554868_13","DOIUrl":"https://doi.org/10.1007/11554868_13","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133117799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Twin RSA
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_16
A. Lenstra, B. Weger
{"title":"Twin RSA","authors":"A. Lenstra, B. Weger","doi":"10.1007/11554868_16","DOIUrl":"https://doi.org/10.1007/11554868_16","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127305169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing 基于同态秘密共享的电子首标密封竞价优化
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_7
Kun Peng, C. Boyd, E. Dawson
{"title":"Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing","authors":"Kun Peng, C. Boyd, E. Dawson","doi":"10.1007/11554868_7","DOIUrl":"https://doi.org/10.1007/11554868_7","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers 具有动态连接和对组管理器保持匿名的高效安全组签名
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_11
A. Kiayias, M. Yung
{"title":"Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers","authors":"A. Kiayias, M. Yung","doi":"10.1007/11554868_11","DOIUrl":"https://doi.org/10.1007/11554868_11","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128135853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Questionable Encryption and Its Applications 可疑加密及其应用
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_15
Adam L. Young, M. Yung
{"title":"Questionable Encryption and Its Applications","authors":"Adam L. Young, M. Yung","doi":"10.1007/11554868_15","DOIUrl":"https://doi.org/10.1007/11554868_15","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"25 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114231880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Family of Fast Syndrome Based Cryptographic Hash Functions 一类基于快速综合征的密码哈希函数
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_6
D. Augot, M. Finiasz, N. Sendrier
{"title":"A Family of Fast Syndrome Based Cryptographic Hash Functions","authors":"D. Augot, M. Finiasz, N. Sendrier","doi":"10.1007/11554868_6","DOIUrl":"https://doi.org/10.1007/11554868_6","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
New Multiset Attacks on Rijndael with Large Blocks 新的多集攻击Rijndael与大块
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_20
Jorge Nakahara, Daniel Santana de Freitas, R. Phan
{"title":"New Multiset Attacks on Rijndael with Large Blocks","authors":"Jorge Nakahara, Daniel Santana de Freitas, R. Phan","doi":"10.1007/11554868_20","DOIUrl":"https://doi.org/10.1007/11554868_20","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Optimization of the MOVA Undeniable Signature Scheme MOVA不可否认签名方案的优化
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_14
Jean Monnerat, Y. Pignolet, S. Vaudenay
{"title":"Optimization of the MOVA Undeniable Signature Scheme","authors":"Jean Monnerat, Y. Pignolet, S. Vaudenay","doi":"10.1007/11554868_14","DOIUrl":"https://doi.org/10.1007/11554868_14","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A New Structural Attack for GPT and Variants 针对GPT及其变体的一种新的结构攻击
International Conference on Cryptology in Malaysia Pub Date : 2005-09-28 DOI: 10.1007/11554868_5
Raphael Overbeck
{"title":"A New Structural Attack for GPT and Variants","authors":"Raphael Overbeck","doi":"10.1007/11554868_5","DOIUrl":"https://doi.org/10.1007/11554868_5","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126945619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信