The Cryptographer's Track at RSA Conference最新文献

筛选
英文 中文
INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes 基于块密码的认证加密方案的INT-RUP分析
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_3
Avik Chakraborti, N. Datta, M. Nandi
{"title":"INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes","authors":"Avik Chakraborti, N. Datta, M. Nandi","doi":"10.1007/978-3-319-29485-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_3","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Factoring N=p^rq^s for Large r and s 分解N=p^rq^s对于大r和s
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_26
J. Coron, J. Faugère, G. Renault, R. Zeitoun
{"title":"Factoring N=p^rq^s for Large r and s","authors":"J. Coron, J. Faugère, G. Renault, R. Zeitoun","doi":"10.1007/978-3-319-29485-8_26","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_26","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125849774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
New Observations on Piccolo Block Cipher 短笛分组密码的新发现
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_22
Yanfeng Wang, Wenling Wu
{"title":"New Observations on Piccolo Block Cipher","authors":"Yanfeng Wang, Wenling Wu","doi":"10.1007/978-3-319-29485-8_22","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_22","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128373636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones Android智能手机上Weierstrass和Koblitz曲线ECDSA的边信道分析
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_14
Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi
{"title":"Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones","authors":"Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi","doi":"10.1007/978-3-319-29485-8_14","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_14","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128977866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
NFLlib: NTT-Based Fast Lattice Library NFLlib:基于ntt的快速格库
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_20
C. A. Melchor, Joris Barrier, S. Guelton, A. Guinet, M. Killijian, Tancrède Lepoint
{"title":"NFLlib: NTT-Based Fast Lattice Library","authors":"C. A. Melchor, Joris Barrier, S. Guelton, A. Guinet, M. Killijian, Tancrède Lepoint","doi":"10.1007/978-3-319-29485-8_20","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_20","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116715789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 134
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs 利用低带宽电磁攻击对pc机进行ECDH密钥提取
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_13
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
{"title":"ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs","authors":"Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer","doi":"10.1007/978-3-319-29485-8_13","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_13","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes 基于对编码方案的完全cca安全谓词加密构造
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_25
Johannes Blömer, Gennadij Liske
{"title":"Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes","authors":"Johannes Blömer, Gennadij Liske","doi":"10.1007/978-3-319-29485-8_25","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_25","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014 Asiacrypt 2014中等价类上保结构签名方案的密码分析
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_17
Yanbin Pan
{"title":"Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014","authors":"Yanbin Pan","doi":"10.1007/978-3-319-29485-8_17","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_17","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131615545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS 从无状态到有状态:应用于TLS的通用身份验证和身份验证加密结构
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_4
C. Boyd, Britta Hale, S. F. Mjølsnes, D. Stebila
{"title":"From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS","authors":"C. Boyd, Britta Hale, S. F. Mjølsnes, D. Stebila","doi":"10.1007/978-3-319-29485-8_4","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_4","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122273891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling 基于验证成功率模型的实际破解GSM A5/1彩虹表优化
The Cryptographer's Track at RSA Conference Pub Date : 2016-02-29 DOI: 10.1007/978-3-319-29485-8_21
Z. Li
{"title":"Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling","authors":"Z. Li","doi":"10.1007/978-3-319-29485-8_21","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_21","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133164262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信