International Conference on Security and Cryptography for Networks最新文献

筛选
英文 中文
Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation 模转换、零检验、比较、MOD和求幂的概率正确安全算术计算
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_24
Ching-Hua Yu, Bo-Yin Yang
{"title":"Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation","authors":"Ching-Hua Yu, Bo-Yin Yang","doi":"10.1007/978-3-642-32928-9_24","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_24","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126731469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited 重新审视Σ-Protocols对群同态的效率限制
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_26
Björn Terelius, Douglas Wikström
{"title":"Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited","authors":"Björn Terelius, Douglas Wikström","doi":"10.1007/978-3-642-32928-9_26","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_26","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption 基于属性的加密中具有隐藏访问控制的遗忘传输
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_31
J. Camenisch, M. Dubovitskaya, Robert R. Enderlein, G. Neven
{"title":"Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption","authors":"J. Camenisch, M. Dubovitskaya, Robert R. Enderlein, G. Neven","doi":"10.1007/978-3-642-32928-9_31","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_31","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Time-Specific Encryption from Forward-Secure Encryption 前向安全加密中的特定时间加密
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_11
Kohei Kasamatsu, Takahiro Matsuda, K. Emura, Nuttapong Attrapadung, Goichiro Hanaoka, H. Imai
{"title":"Time-Specific Encryption from Forward-Secure Encryption","authors":"Kohei Kasamatsu, Takahiro Matsuda, K. Emura, Nuttapong Attrapadung, Goichiro Hanaoka, H. Imai","doi":"10.1007/978-3-642-32928-9_11","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_11","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123257301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings quadis四元数?非交换环上彩虹的密码分析
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_20
Enrico Thomae
{"title":"Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings","authors":"Enrico Thomae","doi":"10.1007/978-3-642-32928-9_20","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_20","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132696673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics 使用LLR和χ 2统计的多重差分密码分析
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_19
Céline Blondeau, Benoît Gérard, K. Nyberg
{"title":"Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics","authors":"Céline Blondeau, Benoît Gérard, K. Nyberg","doi":"10.1007/978-3-642-32928-9_19","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_19","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Homomorphic Encryption for Multiplications and Pairing Evaluation 乘法与配对求值的同态加密
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_21
Guilhem Castagnos, Fabien Laguillaumie
{"title":"Homomorphic Encryption for Multiplications and Pairing Evaluation","authors":"Guilhem Castagnos, Fabien Laguillaumie","doi":"10.1007/978-3-642-32928-9_21","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_21","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127638832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Compact Round-Optimal Partially-Blind Signatures 紧凑的圆最优部分盲签名
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_6
Olivier Blazy, D. Pointcheval, Damien Vergnaud
{"title":"Compact Round-Optimal Partially-Blind Signatures","authors":"Olivier Blazy, D. Pointcheval, Damien Vergnaud","doi":"10.1007/978-3-642-32928-9_6","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_6","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125135231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN 一种新的散列签名方法和DLIN的保结构签名
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_8
Melissa Chase, Markulf Kohlweiss
{"title":"A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN","authors":"Melissa Chase, Markulf Kohlweiss","doi":"10.1007/978-3-642-32928-9_8","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_8","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123235947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting 辅助输入设置下格的确定性公钥加密和基于身份的加密
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_1
Xiang Xie, Rui Xue, Rui Zhang
{"title":"Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting","authors":"Xiang Xie, Rui Xue, Rui Zhang","doi":"10.1007/978-3-642-32928-9_1","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_1","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"430 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133940509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信