The Cryptographer's Track at RSA Conference最新文献

筛选
英文 中文
2-Pass Key Exchange Protocols from CPA-Secure KEM 来自CPA-Secure KEM的2-Pass密钥交换协议
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_20
K. Kurosawa, Jun Furukawa
{"title":"2-Pass Key Exchange Protocols from CPA-Secure KEM","authors":"K. Kurosawa, Jun Furukawa","doi":"10.1007/978-3-319-04852-9_20","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_20","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121091499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Myth of Generic DPA...and the Magic of Learning 通用DPA的神话…以及学习的魔力
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_10
C. Whitnall, E. Oswald, François-Xavier Standaert
{"title":"The Myth of Generic DPA...and the Magic of Learning","authors":"C. Whitnall, E. Oswald, François-Xavier Standaert","doi":"10.1007/978-3-319-04852-9_10","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_10","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl 一种改进回弹攻击的自动评估工具:Grøstl的ShiftBytes参数的新区别和建议
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_22
Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, K. Ohta
{"title":"An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl","authors":"Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, K. Ohta","doi":"10.1007/978-3-319-04852-9_22","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_22","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125774999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation 超越模式:从加密海绵排列构建安全记录协议
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_14
Markku-Juhani O. Saarinen
{"title":"Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation","authors":"Markku-Juhani O. Saarinen","doi":"10.1007/978-3-319-04852-9_14","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_14","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126241924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions CBEAM:弱单向ϕ函数的有效认证加密
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_13
Markku-Juhani O. Saarinen
{"title":"CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions","authors":"Markku-Juhani O. Saarinen","doi":"10.1007/978-3-319-04852-9_13","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_13","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125155814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves 基于glv的标量乘法高效安全算法及其在GLV-GLS曲线上的实现
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_1
Armando Faz-Hernández, P. Longa, A. H. Sánchez
{"title":"Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves","authors":"Armando Faz-Hernández, P. Longa, A. H. Sánchez","doi":"10.1007/978-3-319-04852-9_1","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_1","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures P2OFE:保护隐私的乐观公平数字签名交换
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_19
Qiong Huang, D. Wong, W. Susilo
{"title":"P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures","authors":"Qiong Huang, D. Wong, W. Susilo","doi":"10.1007/978-3-319-04852-9_19","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_19","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133106529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
On Increasing the Throughput of Stream Ciphers 提高流密码的吞吐量
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_7
Frederik Armknecht, Vasily Mikhalev
{"title":"On Increasing the Throughput of Stream Ciphers","authors":"Frederik Armknecht, Vasily Mikhalev","doi":"10.1007/978-3-319-04852-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_7","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions 重新思考可验证加密签名:功能上的差距和潜在的解决方案
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_18
Theresa Calderon, S. Meiklejohn, H. Shacham, Brent Waters
{"title":"Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions","authors":"Theresa Calderon, S. Meiklejohn, H. Shacham, Brent Waters","doi":"10.1007/978-3-319-04852-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_18","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Practical Distributed Signatures in the Standard Model 标准模型中的实用分布式签名
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_16
Yujue Wang, D. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu
{"title":"Practical Distributed Signatures in the Standard Model","authors":"Yujue Wang, D. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu","doi":"10.1007/978-3-319-04852-9_16","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_16","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125770337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信