International Conference on Applied Cryptography and Network Security最新文献

筛选
英文 中文
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes 基于格的DAPS和推广:签名方案中的自执行
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_23
D. Boneh, Sam Kim, V. Nikolaenko
{"title":"Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes","authors":"D. Boneh, Sam Kim, V. Nikolaenko","doi":"10.1007/978-3-319-61204-1_23","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_23","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128712342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography 基于格的密码学的任意中心离散高斯采样
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_1
C. A. Melchor, Martin R. Albrecht, Thomas Ricosset
{"title":"Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography","authors":"C. A. Melchor, Martin R. Albrecht, Thomas Ricosset","doi":"10.1007/978-3-319-61204-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_1","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122499412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security 具有动态读写权限强制的分层密钥分配与扩展ki安全性
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_9
Yi-Ruei Chen, Wen-Guey Tzeng
{"title":"Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security","authors":"Yi-Ruei Chen, Wen-Guey Tzeng","doi":"10.1007/978-3-319-61204-1_9","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_9","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Are You Lying: Validating the Time-Location of Outdoor Images 你在撒谎吗:验证户外图像的时间位置
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_6
Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu
{"title":"Are You Lying: Validating the Time-Location of Outdoor Images","authors":"Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu","doi":"10.1007/978-3-319-61204-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_6","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers 一种针对密钥白化层密码的实用选择消息功率分析方法
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_21
Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
{"title":"A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers","authors":"Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma","doi":"10.1007/978-3-319-61204-1_21","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_21","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"288 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations cMix:混合最小的实时非对称加密操作
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_28
D. Chaum, Debajyoti Das, Farid Javani, Aniket Kate, A. Krasnova, Joeri de Ruiter, A. Sherman
{"title":"cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations","authors":"D. Chaum, Debajyoti Das, Farid Javani, Aniket Kate, A. Krasnova, Joeri de Ruiter, A. Sherman","doi":"10.1007/978-3-319-61204-1_28","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_28","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133408912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis 一种改进的二进制特征集算法及其在代数密码分析中的应用
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_26
S. Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low
{"title":"An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis","authors":"S. Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low","doi":"10.1007/978-3-319-61204-1_26","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_26","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium 一种基于gpu的立方体攻击的新实现——对Trivium的初步结果
International Conference on Applied Cryptography and Network Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-61204-1_10
Marco Cianfriglia, Stefano Guarino, M. Bernaschi, F. Lombardi, M. Pedicini
{"title":"A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium","authors":"Marco Cianfriglia, Stefano Guarino, M. Bernaschi, F. Lombardi, M. Pedicini","doi":"10.1007/978-3-319-61204-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_10","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122488738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks 灯光,摄像机,开始!探索视觉干扰对安全任务完成的影响
International Conference on Applied Cryptography and Network Security Pub Date : 2017-05-31 DOI: 10.1007/978-3-319-61204-1_7
Bruce Berg, Tyler Kaczmarek, A. Kobsa, G. Tsudik
{"title":"Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks","authors":"Bruce Berg, Tyler Kaczmarek, A. Kobsa, G. Tsudik","doi":"10.1007/978-3-319-61204-1_7","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_7","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127357718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks OnionPIR:在线通信网络中敏感元数据的有效保护
International Conference on Applied Cryptography and Network Security Pub Date : 2016-10-01 DOI: 10.1007/978-3-319-61204-1_30
Daniel Demmler, Marco Holz, T. Schneider
{"title":"OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks","authors":"Daniel Demmler, Marco Holz, T. Schneider","doi":"10.1007/978-3-319-61204-1_30","DOIUrl":"https://doi.org/10.1007/978-3-319-61204-1_30","url":null,"abstract":"","PeriodicalId":412384,"journal":{"name":"International Conference on Applied Cryptography and Network Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信