International Conference on Theory and Practice of Public Key Cryptography最新文献

筛选
英文 中文
A Practical Cryptanalysis of WalnutDSA TM 胡桃dsa TM的实用密码分析
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76578-5_13
Daniel Hart, Dohoon Kim, Giacomo Micheli, Guillermo Pascual-Perez, C. Petit, Yuxuan Quek
{"title":"A Practical Cryptanalysis of WalnutDSA TM","authors":"Daniel Hart, Dohoon Kim, Giacomo Micheli, Guillermo Pascual-Perez, C. Petit, Yuxuan Quek","doi":"10.1007/978-3-319-76578-5_13","DOIUrl":"https://doi.org/10.1007/978-3-319-76578-5_13","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli 哈希解决方案而不是生成问题:RSA模的交互认证
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76581-5_14
Benedikt Auerbach, Bertram Poettering
{"title":"Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli","authors":"Benedikt Auerbach, Bertram Poettering","doi":"10.1007/978-3-319-76581-5_14","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_14","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129950334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
New (and Old) Proof Systems for Lattice Problems 格问题的新(旧)证明系统
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76581-5_21
Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz
{"title":"New (and Old) Proof Systems for Lattice Problems","authors":"Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz","doi":"10.1007/978-3-319-76581-5_21","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_21","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116074607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Weakly Secure Equivalence-Class Signatures from Standard Assumptions 基于标准假设的弱安全等价类签名
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76581-5_6
G. Fuchsbauer, Romain Gay
{"title":"Weakly Secure Equivalence-Class Signatures from Standard Assumptions","authors":"G. Fuchsbauer, Romain Gay","doi":"10.1007/978-3-319-76581-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_6","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Two-Factor Authentication with End-to-End Password Security 具有端到端密码安全的双因素身份验证
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76581-5_15
Stanislaw Jarecki, H. Krawczyk, Maliheh Shirvanian, Nitesh Saxena
{"title":"Two-Factor Authentication with End-to-End Password Security","authors":"Stanislaw Jarecki, H. Krawczyk, Maliheh Shirvanian, Nitesh Saxena","doi":"10.1007/978-3-319-76581-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_15","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128691860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Hybrid Encryption in a Multi-user Setting, Revisited 多用户设置下的混合加密,重访
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76578-5_6
F. Giacon, Eike Kiltz, Bertram Poettering
{"title":"Hybrid Encryption in a Multi-user Setting, Revisited","authors":"F. Giacon, Eike Kiltz, Bertram Poettering","doi":"10.1007/978-3-319-76578-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-76578-5_6","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115429359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup 引导区块链,应用于共识和快速PKI设置
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76581-5_16
J. Garay, A. Kiayias, Nikos Leonardos, Giorgos Panagiotakos
{"title":"Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup","authors":"J. Garay, A. Kiayias, Nikos Leonardos, Giorgos Panagiotakos","doi":"10.1007/978-3-319-76581-5_16","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_16","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications 重新审视代理重新加密:前向保密,改进的安全性和应用程序
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76578-5_8
David Derler, S. Krenn, T. Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
{"title":"Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications","authors":"David Derler, S. Krenn, T. Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks","doi":"10.1007/978-3-319-76578-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-76578-5_8","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Non-malleability vs. CCA-Security: The Case of Commitments 不可延展性vs. cca -安全性:承诺的案例
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76581-5_11
Brandon Broadnax, Valerie Fetzer, J. Müller-Quade, Andy Rupp
{"title":"Non-malleability vs. CCA-Security: The Case of Commitments","authors":"Brandon Broadnax, Valerie Fetzer, J. Müller-Quade, Andy Rupp","doi":"10.1007/978-3-319-76581-5_11","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_11","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Covert Two-Party Computation 有效的隐蔽两方计算
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2018-03-25 DOI: 10.1007/978-3-319-76578-5_22
Stanislaw Jarecki
{"title":"Efficient Covert Two-Party Computation","authors":"Stanislaw Jarecki","doi":"10.1007/978-3-319-76578-5_22","DOIUrl":"https://doi.org/10.1007/978-3-319-76578-5_22","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信