The Cryptographer's Track at RSA Conference最新文献

筛选
英文 中文
Doubly Half-Injective PRGs for Incompressible White-Box Cryptography 不可压缩白盒密码的双半内射PRGs
The Cryptographer's Track at RSA Conference Pub Date : 2019-03-04 DOI: 10.1007/978-3-030-12612-4_10
Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, C. Brzuska, Wil Michiels
{"title":"Doubly Half-Injective PRGs for Incompressible White-Box Cryptography","authors":"Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, C. Brzuska, Wil Michiels","doi":"10.1007/978-3-030-12612-4_10","DOIUrl":"https://doi.org/10.1007/978-3-030-12612-4_10","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation 重新审视可验证(外包)计算中使用的秘密隐藏假设
The Cryptographer's Track at RSA Conference Pub Date : 2019-03-04 DOI: 10.1007/978-3-030-12612-4_26
Liang Zhao
{"title":"Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation","authors":"Liang Zhao","doi":"10.1007/978-3-030-12612-4_26","DOIUrl":"https://doi.org/10.1007/978-3-030-12612-4_26","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131231753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation 单调跨程序的错误检测及其在高效通信多方计算中的应用
The Cryptographer's Track at RSA Conference Pub Date : 2019-03-04 DOI: 10.1007/978-3-030-12612-4_11
N. Smart, Tim Wood
{"title":"Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation","authors":"N. Smart, Tim Wood","doi":"10.1007/978-3-030-12612-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-12612-4_11","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117319917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality 有效的函数隐藏函数加密:从内积到正交
The Cryptographer's Track at RSA Conference Pub Date : 2019-03-04 DOI: 10.1007/978-3-030-12612-4_7
M. Barbosa, D. Catalano, Azam Soleimanian, B. Warinschi
{"title":"Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality","authors":"M. Barbosa, D. Catalano, Azam Soleimanian, B. Warinschi","doi":"10.1007/978-3-030-12612-4_7","DOIUrl":"https://doi.org/10.1007/978-3-030-12612-4_7","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130592171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Linking Stam's Bounds with Generalized Truncation 用广义截断连接流界
The Cryptographer's Track at RSA Conference Pub Date : 2019-03-04 DOI: 10.1007/978-3-030-12612-4_16
Bart Mennink
{"title":"Linking Stam's Bounds with Generalized Truncation","authors":"Bart Mennink","doi":"10.1007/978-3-030-12612-4_16","DOIUrl":"https://doi.org/10.1007/978-3-030-12612-4_16","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126532132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Post-quantum EPID Signatures from Symmetric Primitives 对称基元的后量子EPID签名
The Cryptographer's Track at RSA Conference Pub Date : 2019-03-04 DOI: 10.1007/978-3-030-12612-4_13
D. Boneh, Saba Eskandarian, Ben Fisch
{"title":"Post-quantum EPID Signatures from Symmetric Primitives","authors":"D. Boneh, Saba Eskandarian, Ben Fisch","doi":"10.1007/978-3-030-12612-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-12612-4_13","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133398257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
EPIC: Efficient Private Image Classification (or: Learning from the Masters) EPIC:高效私有图像分类(或:向大师学习)
The Cryptographer's Track at RSA Conference Pub Date : 2019-03-04 DOI: 10.1007/978-3-030-12612-4_24
Eleftheria Makri, Dragos Rotaru, N. Smart, F. Vercauteren
{"title":"EPIC: Efficient Private Image Classification (or: Learning from the Masters)","authors":"Eleftheria Makri, Dragos Rotaru, N. Smart, F. Vercauteren","doi":"10.1007/978-3-030-12612-4_24","DOIUrl":"https://doi.org/10.1007/978-3-030-12612-4_24","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128986937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
New Techniques for Multi-value Input Homomorphic Evaluation and Applications 多值输入同态评价新技术及其应用
The Cryptographer's Track at RSA Conference Pub Date : 2019-03-04 DOI: 10.1007/978-3-030-12612-4_6
Sergiu Carpov, Malika Izabachène, Victor Mollimard
{"title":"New Techniques for Multi-value Input Homomorphic Evaluation and Applications","authors":"Sergiu Carpov, Malika Izabachène, Victor Mollimard","doi":"10.1007/978-3-030-12612-4_6","DOIUrl":"https://doi.org/10.1007/978-3-030-12612-4_6","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132490771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange
The Cryptographer's Track at RSA Conference Pub Date : 2018-04-16 DOI: 10.1007/978-3-319-76953-0_24
Brian Koziel, R. Azarderakhsh, David Jao
{"title":"An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange","authors":"Brian Koziel, R. Azarderakhsh, David Jao","doi":"10.1007/978-3-319-76953-0_24","DOIUrl":"https://doi.org/10.1007/978-3-319-76953-0_24","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121449717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Two-Message Key Exchange with Strong Security from Ideal Lattices 理想格下具有强安全性的双消息密钥交换
The Cryptographer's Track at RSA Conference Pub Date : 2018-04-16 DOI: 10.1007/978-3-319-76953-0_6
Zheng Yang, Yu Chen, Song Luo
{"title":"Two-Message Key Exchange with Strong Security from Ideal Lattices","authors":"Zheng Yang, Yu Chen, Song Luo","doi":"10.1007/978-3-319-76953-0_6","DOIUrl":"https://doi.org/10.1007/978-3-319-76953-0_6","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133681126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信