International Conference on Applied Cryptography and Network Security最新文献

筛选
英文 中文
Deterministic Public-Key Encryption Under Continual Leakage 连续泄漏下的确定性公钥加密
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_17
Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters
{"title":"Deterministic Public-Key Encryption Under Continual Leakage","authors":"Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters","doi":"10.1007/978-3-319-39555-5_17","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_17","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Legally Fair Contract Signing Without Keystones 法律上公平的合同签订没有基石
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_10
Houda Ferradi, R. Géraud, Diana Maimuţ, D. Naccache, D. Pointcheval
{"title":"Legally Fair Contract Signing Without Keystones","authors":"Houda Ferradi, R. Géraud, Diana Maimuţ, D. Naccache, D. Pointcheval","doi":"10.1007/978-3-319-39555-5_10","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_10","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127486824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
New Techniques for Non-interactive Shuffle and Range Arguments 非交互式洗牌和范围参数的新技术
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_23
Alonso González, Carla Ràfols
{"title":"New Techniques for Non-interactive Shuffle and Range Arguments","authors":"Alonso González, Carla Ràfols","doi":"10.1007/978-3-319-39555-5_23","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_23","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security 阈值最优DSA/ECDSA签名及其在比特币钱包安全中的应用
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_9
R. Gennaro, Steven Goldfeder, Arvind Narayanan
{"title":"Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security","authors":"R. Gennaro, Steven Goldfeder, Arvind Narayanan","doi":"10.1007/978-3-319-39555-5_9","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_9","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 193
Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes 二元混合列宽径设计策略——增强有源s盒数下界
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_25
Yosuke Todo, Kazumaro Aoki
{"title":"Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes","authors":"Yosuke Todo, Kazumaro Aoki","doi":"10.1007/978-3-319-39555-5_25","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_25","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114245430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions 具有快捷方式的图灵机:基于属性的有界函数的有效加密
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_15
Xavier Boyen, Qinyi Li
{"title":"Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions","authors":"Xavier Boyen, Qinyi Li","doi":"10.1007/978-3-319-39555-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_15","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114980290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accelerating Homomorphic Computations on Rational Numbers 有理数上的加速同态计算
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_22
Angela Jäschke, Frederik Armknecht
{"title":"Accelerating Homomorphic Computations on Rational Numbers","authors":"Angela Jäschke, Frederik Armknecht","doi":"10.1007/978-3-319-39555-5_22","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_22","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134317212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Constrained PRFs for Unbounded Inputs with Short Keys 具有短键的无界输入的约束prf
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_24
Hamza Abusalah, G. Fuchsbauer
{"title":"Constrained PRFs for Unbounded Inputs with Short Keys","authors":"Hamza Abusalah, G. Fuchsbauer","doi":"10.1007/978-3-319-39555-5_24","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_24","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice 轻量级分组密码的相关功率分析:从理论到实践
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_29
A. Biryukov, Daniel Dinu, J. Großschädl
{"title":"Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice","authors":"A. Biryukov, Daniel Dinu, J. Großschädl","doi":"10.1007/978-3-319-39555-5_29","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_29","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125126367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey 用SPECK和Chaskey在ARX中自动搜索线性轨迹
International Conference on Applied Cryptography and Network Security Pub Date : 2016-06-19 DOI: 10.1007/978-3-319-39555-5_26
Yunwen Liu, Qingju Wang, V. Rijmen
{"title":"Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey","authors":"Yunwen Liu, Qingju Wang, V. Rijmen","doi":"10.1007/978-3-319-39555-5_26","DOIUrl":"https://doi.org/10.1007/978-3-319-39555-5_26","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130571278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信