The Cryptographer's Track at RSA Conference最新文献

筛选
英文 中文
On Increasing the Throughput of Stream Ciphers 提高流密码的吞吐量
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_7
Frederik Armknecht, Vasily Mikhalev
{"title":"On Increasing the Throughput of Stream Ciphers","authors":"Frederik Armknecht, Vasily Mikhalev","doi":"10.1007/978-3-319-04852-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_7","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions 重新思考可验证加密签名:功能上的差距和潜在的解决方案
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_18
Theresa Calderon, S. Meiklejohn, H. Shacham, Brent Waters
{"title":"Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions","authors":"Theresa Calderon, S. Meiklejohn, H. Shacham, Brent Waters","doi":"10.1007/978-3-319-04852-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_18","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Key Wrapping with a Fixed Permutation 固定排列的钥匙包装
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_25
D. Khovratovich
{"title":"Key Wrapping with a Fixed Permutation","authors":"D. Khovratovich","doi":"10.1007/978-3-319-04852-9_25","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_25","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130647368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL 对PolarSSL中受保护的RSA-CRT实现的定时攻击
The Cryptographer's Track at RSA Conference Pub Date : 2013-02-25 DOI: 10.1007/978-3-642-36095-4_2
C. Arnaud, Pierre-Alain Fouque
{"title":"Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL","authors":"C. Arnaud, Pierre-Alain Fouque","doi":"10.1007/978-3-642-36095-4_2","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_2","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114184798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Collisions for the WIDEA-8 Compression Function WIDEA-8压缩功能的碰撞
The Cryptographer's Track at RSA Conference Pub Date : 2013-02-25 DOI: 10.1007/978-3-642-36095-4_11
Florian Mendel, V. Rijmen, Deniz Toz, Kerem Varici
{"title":"Collisions for the WIDEA-8 Compression Function","authors":"Florian Mendel, V. Rijmen, Deniz Toz, Kerem Varici","doi":"10.1007/978-3-642-36095-4_11","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_11","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129704919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy 具有近似完全保密的全同态密码系统
The Cryptographer's Track at RSA Conference Pub Date : 2013-02-25 DOI: 10.1007/978-3-642-36095-4_24
Michal Hojsík, Veronika Pulpánová
{"title":"A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy","authors":"Michal Hojsík, Veronika Pulpánová","doi":"10.1007/978-3-642-36095-4_24","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_24","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128390117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Finding Collisions for Round-Reduced SM3 寻找减少轮数SM3的碰撞
The Cryptographer's Track at RSA Conference Pub Date : 2013-02-25 DOI: 10.1007/978-3-642-36095-4_12
Florian Mendel, T. Nad, Martin Schläffer
{"title":"Finding Collisions for Round-Reduced SM3","authors":"Florian Mendel, T. Nad, Martin Schläffer","doi":"10.1007/978-3-642-36095-4_12","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_12","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Accountable Authority Identity-Based Encryption with Public Traceability 具有公共可追溯性的基于问责机构身份的加密
The Cryptographer's Track at RSA Conference Pub Date : 2013-02-25 DOI: 10.1007/978-3-642-36095-4_21
Junzuo Lai, R. Deng, Yunlei Zhao, J. Weng
{"title":"Accountable Authority Identity-Based Encryption with Public Traceability","authors":"Junzuo Lai, R. Deng, Yunlei Zhao, J. Weng","doi":"10.1007/978-3-642-36095-4_21","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_21","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124860254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag 应用远程侧信道分析攻击的安全启用NFC标签
The Cryptographer's Track at RSA Conference Pub Date : 2013-02-25 DOI: 10.1007/978-3-642-36095-4_14
Thomas Korak, Thomas Plos
{"title":"Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag","authors":"Thomas Korak, Thomas Plos","doi":"10.1007/978-3-642-36095-4_14","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_14","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 基于CT-RSA2012的更强安全模型中的代理重加密
The Cryptographer's Track at RSA Conference Pub Date : 2013-02-25 DOI: 10.1007/978-3-642-36095-4_18
Toshiyuki Isshiki, M. H. Nguyen, Keisuke Tanaka
{"title":"Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012","authors":"Toshiyuki Isshiki, M. H. Nguyen, Keisuke Tanaka","doi":"10.1007/978-3-642-36095-4_18","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_18","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信