International Conference on Security and Cryptography for Networks最新文献

筛选
英文 中文
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions 量子demiric - sel<s:1>中间相遇攻击:在6轮非斯特尔构造中的应用
International Conference on Security and Cryptography for Networks Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_21
Akinori Hosoyamada, Yu Sasaki
{"title":"Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions","authors":"Akinori Hosoyamada, Yu Sasaki","doi":"10.1007/978-3-319-98113-0_21","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_21","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Compact IBBE and Fuzzy IBE from Simple Assumptions 基于简单假设的紧凑IBBE和模糊IBBE
International Conference on Security and Cryptography for Networks Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_30
Junqing Gong, Benoît Libert, Somindu C. Ramanna
{"title":"Compact IBBE and Fuzzy IBE from Simple Assumptions","authors":"Junqing Gong, Benoît Libert, Somindu C. Ramanna","doi":"10.1007/978-3-319-98113-0_30","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_30","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters 高效可扩展的多方私有集交集通过乱码布隆过滤器
International Conference on Security and Cryptography for Networks Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_13
Roi Inbar, Eran Omri, Benny Pinkas
{"title":"Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters","authors":"Roi Inbar, Eran Omri, Benny Pinkas","doi":"10.1007/978-3-319-98113-0_13","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_13","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117042775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange 非对称密码认证密钥交换的轮约模块化构造
International Conference on Security and Cryptography for Networks Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_26
J. Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, J. Shin, Jiayu Xu
{"title":"Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange","authors":"J. Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, J. Shin, Jiayu Xu","doi":"10.1007/978-3-319-98113-0_26","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_26","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133141581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Proactive Secure Multiparty Computation with a Dishonest Majority 具有不诚实多数的主动安全多方计算
International Conference on Security and Cryptography for Networks Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_11
Karim M. El Defrawy, R. Ostrovsky, Sunoo Park, M. Yung
{"title":"Proactive Secure Multiparty Computation with a Dishonest Majority","authors":"Karim M. El Defrawy, R. Ostrovsky, Sunoo Park, M. Yung","doi":"10.1007/978-3-319-98113-0_11","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_11","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121593491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Security Definitions for Hash Functions: Combining UCE and Indifferentiability 哈希函数的安全定义:结合UCE和不可微性
International Conference on Security and Cryptography for Networks Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_5
D. Jost, U. Maurer
{"title":"Security Definitions for Hash Functions: Combining UCE and Indifferentiability","authors":"D. Jost, U. Maurer","doi":"10.1007/978-3-319-98113-0_5","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_5","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133365644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation 多项式硬度的混淆:超越可分解的混淆
International Conference on Security and Cryptography for Networks Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_22
Y. Kang, Chengyu Lin, T. Malkin, Mariana Raykova
{"title":"Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation","authors":"Y. Kang, Chengyu Lin, T. Malkin, Mariana Raykova","doi":"10.1007/978-3-319-98113-0_22","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_22","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129210910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Function-Revealing Encryption - Definitions and Constructions 揭示函数的加密。定义和构造
International Conference on Security and Cryptography for Networks Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_28
M. Joye, Alain Passelègue
{"title":"Function-Revealing Encryption - Definitions and Constructions","authors":"M. Joye, Alain Passelègue","doi":"10.1007/978-3-319-98113-0_28","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_28","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116477739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fully Anonymous Group Signature with Verifier-Local Revocation 具有验证器本地撤销的完全匿名组签名
International Conference on Security and Cryptography for Networks Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98113-0_2
Ai Ishida, Yusuke Sakai, K. Emura, Goichiro Hanaoka, Keisuke Tanaka
{"title":"Fully Anonymous Group Signature with Verifier-Local Revocation","authors":"Ai Ishida, Yusuke Sakai, K. Emura, Goichiro Hanaoka, Keisuke Tanaka","doi":"10.1007/978-3-319-98113-0_2","DOIUrl":"https://doi.org/10.1007/978-3-319-98113-0_2","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124221009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Signatures Resilient to Uninvertible Leakage 签名适应不可逆泄漏
International Conference on Security and Cryptography for Networks Pub Date : 2016-08-31 DOI: 10.1007/978-3-319-44618-9_20
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
{"title":"Signatures Resilient to Uninvertible Leakage","authors":"Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka","doi":"10.1007/978-3-319-44618-9_20","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_20","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122049629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信