The Cryptographer's Track at RSA Conference最新文献

筛选
英文 中文
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks 多子密钥侧信道攻击的有界空间近最优密钥枚举算法
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_18
Liron David, A. Wool
{"title":"A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks","authors":"Liron David, A. Wool","doi":"10.1007/978-3-319-52153-4_18","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_18","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120980551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves 椭圆曲线上的免编码elgamal型加密方案
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_2
M. Joye, Benoît Libert
{"title":"Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves","authors":"M. Joye, Benoît Libert","doi":"10.1007/978-3-319-52153-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_2","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122212002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ridge-Based Profiled Differential Power Analysis 脊型差分功率分析
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_20
Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang
{"title":"Ridge-Based Profiled Differential Power Analysis","authors":"Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang","doi":"10.1007/978-3-319-52153-4_20","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_20","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127355302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware 隐藏高阶侧信道泄漏——可重构硬件中的随机加密实现
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_8
Pascal Sasdrich, A. Moradi, T. Güneysu
{"title":"Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware","authors":"Pascal Sasdrich, A. Moradi, T. Güneysu","doi":"10.1007/978-3-319-52153-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_8","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114431804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Gauss Sieve Algorithm on GPUs gpu上的高斯筛算法
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_3
Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng
{"title":"Gauss Sieve Algorithm on GPUs","authors":"Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng","doi":"10.1007/978-3-319-52153-4_3","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_3","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121146451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters 素序群中新的可撤销IBE:自适应安全、抗解密密钥暴露和短公共参数
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_25
Yohei Watanabe, K. Emura, Jae Hong Seo
{"title":"New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters","authors":"Yohei Watanabe, K. Emura, Jae Hong Seo","doi":"10.1007/978-3-319-52153-4_25","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_25","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"86 2-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Weak Keys for AEZ, and the External Key Padding Attack AEZ的弱密钥,以及外部密钥填充攻击
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_13
Bart Mennink
{"title":"Weak Keys for AEZ, and the External Key Padding Attack","authors":"Bart Mennink","doi":"10.1007/978-3-319-52153-4_13","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_13","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126619911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection 主动安全1- of- n not扩展及其在私有集交集上的应用
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_22
Michele Orrù, Emmanuela Orsini, Peter Scholl
{"title":"Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection","authors":"Michele Orrù, Emmanuela Orsini, Peter Scholl","doi":"10.1007/978-3-319-52153-4_22","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_22","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115483482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction 基于Even-Mansour结构的新型白盒分组密码
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_17
Jihoon Cho, K. Choi, Itai Dinur, O. Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg
{"title":"WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction","authors":"Jihoon Cho, K. Choi, Itai Dinur, O. Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg","doi":"10.1007/978-3-319-52153-4_17","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_17","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123339412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks 结构安全的接收机选择打开和选择的密文攻击
The Cryptographer's Track at RSA Conference Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_24
Dingding Jia, Xianhui Lu, Bao Li
{"title":"Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks","authors":"Dingding Jia, Xianhui Lu, Bao Li","doi":"10.1007/978-3-319-52153-4_24","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_24","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信