The Cryptographer's Track at RSA Conference最新文献

筛选
英文 中文
How to Incorporate Associated Data in Sponge-Based Authenticated Encryption 如何在基于海绵的身份验证加密中合并关联数据
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_19
Yu Sasaki, K. Yasuda
{"title":"How to Incorporate Associated Data in Sponge-Based Authenticated Encryption","authors":"Yu Sasaki, K. Yasuda","doi":"10.1007/978-3-319-16715-2_19","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_19","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126635720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Non-Interactive Zero-Knowledge Proofs of Non-Membership 非隶属性的非交互式零知识证明
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_8
Olivier Blazy, Céline Chevalier, Damien Vergnaud
{"title":"Non-Interactive Zero-Knowledge Proofs of Non-Membership","authors":"Olivier Blazy, Céline Chevalier, Damien Vergnaud","doi":"10.1007/978-3-319-16715-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_8","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"137 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114003959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Format Oracles on OpenPGP 在OpenPGP上格式化oracle
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_12
F. Maury, Jean-René Reinhard, O. Levillain, H. Gilbert
{"title":"Format Oracles on OpenPGP","authors":"F. Maury, Jean-René Reinhard, O. Levillain, H. Gilbert","doi":"10.1007/978-3-319-16715-2_12","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_12","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121715075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved Attacks on Reduced-Round Camellia-128/192/256 增加对减少圆形茶花的攻击-128/192/256
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_4
Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
{"title":"Improved Attacks on Reduced-Round Camellia-128/192/256","authors":"Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang","doi":"10.1007/978-3-319-16715-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_4","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132205437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Efficient Leakage Resilient Circuit Compilers 高效泄漏弹性电路编译器
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_17
Marcin Andrychowicz, I. Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou
{"title":"Efficient Leakage Resilient Circuit Compilers","authors":"Marcin Andrychowicz, I. Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou","doi":"10.1007/978-3-319-16715-2_17","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_17","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133684015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cache Storage Attacks 缓存存储攻击
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_2
B. Brumley
{"title":"Cache Storage Attacks","authors":"B. Brumley","doi":"10.1007/978-3-319-16715-2_2","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_2","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132987472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption 公钥加密中单比特投影- kdm安全性的完备性
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_11
Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
{"title":"Completeness of Single-Bit Projection-KDM Security for Public Key Encryption","authors":"Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka","doi":"10.1007/978-3-319-16715-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_11","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128870452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace 利用单迹利用基于加法链的求幂算法中的冲突
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_23
Neil Hanley, Heeseok Kim, Michael Tunstall
{"title":"Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace","authors":"Neil Hanley, Heeseok Kim, Michael Tunstall","doi":"10.1007/978-3-319-16715-2_23","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_23","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"216 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120899749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts 可撤销的分层身份加密:无历史更新,内部安全,短密文
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_6
Jae Hong Seo, K. Emura
{"title":"Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts","authors":"Jae Hong Seo, K. Emura","doi":"10.1007/978-3-319-16715-2_6","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_6","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132710133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Implementing GCM on ARMv8 在ARMv8上实现GCM
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_9
C. Gouvêa, J. C. López-Hernández
{"title":"Implementing GCM on ARMv8","authors":"C. Gouvêa, J. C. López-Hernández","doi":"10.1007/978-3-319-16715-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_9","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"11 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132360370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信