The Cryptographer's Track at RSA Conference最新文献

筛选
英文 中文
Hash Functions from Defective Ideal Ciphers 缺陷理想密码的哈希函数
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_15
Jonathan Katz, S. Lucks, Aishwarya Thiruvengadam
{"title":"Hash Functions from Defective Ideal Ciphers","authors":"Jonathan Katz, S. Lucks, Aishwarya Thiruvengadam","doi":"10.1007/978-3-319-16715-2_15","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_15","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings ABE中的对偶性:用计算编码转换基于属性的对偶谓词和对偶策略加密
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_5
Nuttapong Attrapadung, Shota Yamada
{"title":"Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings","authors":"Nuttapong Attrapadung, Shota Yamada","doi":"10.1007/978-3-319-16715-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_5","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication 使用纠错码进行快速、超越生日限制的认证
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_16
Yusi Zhang
{"title":"Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication","authors":"Yusi Zhang","doi":"10.1007/978-3-319-16715-2_16","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_16","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117152856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cryptanalysis of Ascon Ascon密码分析
The Cryptographer's Track at RSA Conference Pub Date : 2015-04-20 DOI: 10.1007/978-3-319-16715-2_20
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
{"title":"Cryptanalysis of Ascon","authors":"Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer","doi":"10.1007/978-3-319-16715-2_20","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_20","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126905777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Automatic Search for Differential Trails in ARX Ciphers 在ARX密码中自动搜索差分轨迹
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_12
A. Biryukov, V. Velichkov
{"title":"Automatic Search for Differential Trails in ARX Ciphers","authors":"A. Biryukov, V. Velichkov","doi":"10.1007/978-3-319-04852-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_12","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Hardware Implementation and Side-Channel Analysis of Lapin Lapin的硬件实现与侧信道分析
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_11
Lubos Gaspar, G. Leurent, François-Xavier Standaert
{"title":"Hardware Implementation and Side-Channel Analysis of Lapin","authors":"Lubos Gaspar, G. Leurent, François-Xavier Standaert","doi":"10.1007/978-3-319-04852-9_11","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_11","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
KDM Security in the Hybrid Framework 混合框架中的KDM安全性
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_24
Gareth T. Davies, Martijn Stam
{"title":"KDM Security in the Hybrid Framework","authors":"Gareth T. Davies, Martijn Stam","doi":"10.1007/978-3-319-04852-9_24","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_24","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Group Signatures with Message-Dependent Opening in the Standard Model 标准模型中具有消息相关打开的组签名
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_15
Benoît Libert, M. Joye
{"title":"Group Signatures with Message-Dependent Opening in the Standard Model","authors":"Benoît Libert, M. Joye","doi":"10.1007/978-3-319-04852-9_15","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_15","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132633779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
On Double Exponentiation for Securing RSA against Fault Analysis 基于双幂运算的RSA安全防护
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_8
Duc-Phong Le, Matthieu Rivain, C. H. Tan
{"title":"On Double Exponentiation for Securing RSA against Fault Analysis","authors":"Duc-Phong Le, Matthieu Rivain, C. H. Tan","doi":"10.1007/978-3-319-04852-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_8","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127498923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Practical Collision Attack on 40-Step RIPEMD-128 40步RIPEMD-128的实际碰撞攻击
The Cryptographer's Track at RSA Conference Pub Date : 2014-02-25 DOI: 10.1007/978-3-319-04852-9_23
Gaoli Wang
{"title":"Practical Collision Attack on 40-Step RIPEMD-128","authors":"Gaoli Wang","doi":"10.1007/978-3-319-04852-9_23","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_23","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129754235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信