International Conference on Applied Cryptography and Network Security最新文献

筛选
英文 中文
More Efficient Construction of Bounded KDM Secure Encryption 更有效的有界KDM安全加密构造
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_18
K. Kurosawa, Rie Habuka
{"title":"More Efficient Construction of Bounded KDM Secure Encryption","authors":"K. Kurosawa, Rie Habuka","doi":"10.1007/978-3-319-61204-1_18","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_18","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"415 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126697429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Legacy-Compliant Data Authentication for Industrial Control System Traffic 工业控制系统流量的传统数据认证
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_33
J. H. Castellanos, D. Antonioli, Nils Ole Tippenhauer, Martín Ochoa
{"title":"Legacy-Compliant Data Authentication for Industrial Control System Traffic","authors":"J. H. Castellanos, D. Antonioli, Nils Ole Tippenhauer, Martín Ochoa","doi":"10.1007/978-3-319-61204-1_33","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_33","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF TOPPSS:基于阈值OPRF的最小代价密码保护秘密共享
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_3
Stanislaw Jarecki, A. Kiayias, H. Krawczyk, Jiayu Xu
{"title":"TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF","authors":"Stanislaw Jarecki, A. Kiayias, H. Krawczyk, Jiayu Xu","doi":"10.1007/978-3-319-61204-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_3","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122315511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs 标记二部图上的前向安全可搜索加密
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_24
Russell W. F. Lai, Sherman S. M. Chow
{"title":"Forward-Secure Searchable Encryption on Labeled Bipartite Graphs","authors":"Russell W. F. Lai, Sherman S. M. Chow","doi":"10.1007/978-3-319-61204-1_24","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_24","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134607729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model) 自适应证明有直线提取器(在随机Oracle模型中)
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_17
D. Bernhard, Ngoc Khanh Nguyen, B. Warinschi
{"title":"Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)","authors":"D. Bernhard, Ngoc Khanh Nguyen, B. Warinschi","doi":"10.1007/978-3-319-61204-1_17","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_17","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115183263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bounds in Various Generalized Settings of the Discrete Logarithm Problem 离散对数问题的各种广义集的界
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_25
Jason H. M. Ying, N. Kunihiro
{"title":"Bounds in Various Generalized Settings of the Discrete Logarithm Problem","authors":"Jason H. M. Ying, N. Kunihiro","doi":"10.1007/978-3-319-61204-1_25","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_25","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129154142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Side-Channel Attacks Meet Secure Network Protocols 侧信道攻击满足安全网络协议
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_22
A. Biryukov, Daniel Dinu, Yann Le Corre
{"title":"Side-Channel Attacks Meet Secure Network Protocols","authors":"A. Biryukov, Daniel Dinu, Yann Le Corre","doi":"10.1007/978-3-319-61204-1_22","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_22","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126248492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols 破坏和修复基于oauth2.0协议的移动应用程序身份验证
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_16
Ronghai Yang, W. Lau, Shangcheng Shi
{"title":"Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols","authors":"Ronghai Yang, W. Lau, Shangcheng Shi","doi":"10.1007/978-3-319-61204-1_16","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_16","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133540157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Related-Key Impossible-Differential Attack on Reduced-Round Skinny 对圆缩窄的相关键不可能差分攻击
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_11
Ralph Ankele, S. Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
{"title":"Related-Key Impossible-Differential Attack on Reduced-Round Skinny","authors":"Ralph Ankele, S. Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang","doi":"10.1007/978-3-319-61204-1_11","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_11","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133692574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
An Experimental Study of the BDD Approach for the Search LWE Problem 搜索LWE问题的BDD方法实验研究
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_13
Rui Xu, S. Yeo, Kazuhide Fukushima, T. Takagi, Hwajung Seo, S. Kiyomoto, Matt Henricksen
{"title":"An Experimental Study of the BDD Approach for the Search LWE Problem","authors":"Rui Xu, S. Yeo, Kazuhide Fukushima, T. Takagi, Hwajung Seo, S. Kiyomoto, Matt Henricksen","doi":"10.1007/978-3-319-61204-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_13","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115840845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信