International Conference on Security and Cryptography for Networks最新文献

筛选
英文 中文
MAC Aggregation with Message Multiplicity 具有消息多重性的MAC聚合
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_25
V. Kolesnikov
{"title":"MAC Aggregation with Message Multiplicity","authors":"V. Kolesnikov","doi":"10.1007/978-3-642-32928-9_25","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_25","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131927148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output 二阶预像阻力、目标碰撞阻力和预像阻力的哈希组合器输出时间长
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_29
Arno Mittelbach
{"title":"Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output","authors":"Arno Mittelbach","doi":"10.1007/978-3-642-32928-9_29","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_29","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134152695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Publicly Verifiable Ciphertexts 可公开验证的密文
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_22
J. G. Nieto, M. Manulis, Bertram Poettering, Jothi Rangasamy, D. Stebila
{"title":"Publicly Verifiable Ciphertexts","authors":"J. G. Nieto, M. Manulis, Bertram Poettering, Jothi Rangasamy, D. Stebila","doi":"10.1007/978-3-642-32928-9_22","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_22","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130970795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient Structure-Preserving Signature Scheme from Standard Assumptions 基于标准假设的高效保结构签名方案
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_5
J. Camenisch, M. Dubovitskaya, Kristiyan Haralambiev
{"title":"Efficient Structure-Preserving Signature Scheme from Standard Assumptions","authors":"J. Camenisch, M. Dubovitskaya, Kristiyan Haralambiev","doi":"10.1007/978-3-642-32928-9_5","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_5","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
On the Strength Comparison of the ECDLP and the IFP 论欧洲民主工党与IFP的实力比较
International Conference on Security and Cryptography for Networks Pub Date : 2012-09-05 DOI: 10.1007/978-3-642-32928-9_17
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, T. Izu
{"title":"On the Strength Comparison of the ECDLP and the IFP","authors":"Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, T. Izu","doi":"10.1007/978-3-642-32928-9_17","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_17","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132106350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Fiat-Shamir Transform for Group and Ring Signature Schemes 群和环签名方案的Fiat-Shamir变换
International Conference on Security and Cryptography for Networks Pub Date : 2010-09-13 DOI: 10.1007/978-3-642-15317-4_23
Ming-Feng Lee, N. Smart, B. Warinschi
{"title":"The Fiat-Shamir Transform for Group and Ring Signature Schemes","authors":"Ming-Feng Lee, N. Smart, B. Warinschi","doi":"10.1007/978-3-642-15317-4_23","DOIUrl":"https://doi.org/10.1007/978-3-642-15317-4_23","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134063942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model 短认证字符串模型中具有密钥重用的认证密钥协议
International Conference on Security and Cryptography for Networks Pub Date : 2010-09-13 DOI: 10.1007/978-3-642-15317-4_17
Stanislaw Jarecki, Nitesh Saxena
{"title":"Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model","authors":"Stanislaw Jarecki, Nitesh Saxena","doi":"10.1007/978-3-642-15317-4_17","DOIUrl":"https://doi.org/10.1007/978-3-642-15317-4_17","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Recursive Lattice Reduction 递归格约简
International Conference on Security and Cryptography for Networks Pub Date : 2010-09-13 DOI: 10.1007/978-3-642-15317-4_21
T. Plantard, W. Susilo
{"title":"Recursive Lattice Reduction","authors":"T. Plantard, W. Susilo","doi":"10.1007/978-3-642-15317-4_21","DOIUrl":"https://doi.org/10.1007/978-3-642-15317-4_21","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115386486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Security Model for Authenticated Key Agreement 一种新的认证密钥协议安全模型
International Conference on Security and Cryptography for Networks Pub Date : 2010-09-13 DOI: 10.1007/978-3-642-15317-4_15
Augustin P. Sarr, P. Elbaz-Vincent, J. Bajard
{"title":"A New Security Model for Authenticated Key Agreement","authors":"Augustin P. Sarr, P. Elbaz-Vincent, J. Bajard","doi":"10.1007/978-3-642-15317-4_15","DOIUrl":"https://doi.org/10.1007/978-3-642-15317-4_15","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116543330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Get Shorty via Group Signatures without Encryption 获得短通过组签名没有加密
International Conference on Security and Cryptography for Networks Pub Date : 2010-09-13 DOI: 10.1007/978-3-642-15317-4_24
Patrik Bichsel, J. Camenisch, G. Neven, N. Smart, B. Warinschi
{"title":"Get Shorty via Group Signatures without Encryption","authors":"Patrik Bichsel, J. Camenisch, G. Neven, N. Smart, B. Warinschi","doi":"10.1007/978-3-642-15317-4_24","DOIUrl":"https://doi.org/10.1007/978-3-642-15317-4_24","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114926999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信