International Conference on Theory and Practice of Public Key Cryptography最新文献

筛选
英文 中文
Making Sigma-Protocols Non-interactive Without Random Oracles 使西格玛协议在没有随机预言的情况下非交互
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_29
Pyrros Chaidos, Jens Groth
{"title":"Making Sigma-Protocols Non-interactive Without Random Oracles","authors":"Pyrros Chaidos, Jens Groth","doi":"10.1007/978-3-662-46447-2_29","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_29","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125562517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem 随机游走的碰撞和对离散对数问题攻击的精细分析
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_6
S. Kijima, R. Montenegro
{"title":"Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem","authors":"S. Kijima, R. Montenegro","doi":"10.1007/978-3-662-46447-2_6","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_6","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Anonymous Transferable E-Cash 匿名可转让电子现金
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_5
Foteini Baldimtsi, Melissa Chase, G. Fuchsbauer, Markulf Kohlweiss
{"title":"Anonymous Transferable E-Cash","authors":"Foteini Baldimtsi, Melissa Chase, G. Fuchsbauer, Markulf Kohlweiss","doi":"10.1007/978-3-662-46447-2_5","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_5","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131136245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
On the Practical Security of Inner Product Functional Encryption 论内积函数加密的实用安全性
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_35
Shashank Agrawal, Shweta Agrawal, S. Badrinarayanan, Abishek Kumarasubramanian, M. Prabhakaran, A. Sahai
{"title":"On the Practical Security of Inner Product Functional Encryption","authors":"Shashank Agrawal, Shweta Agrawal, S. Badrinarayanan, Abishek Kumarasubramanian, M. Prabhakaran, A. Sahai","doi":"10.1007/978-3-662-46447-2_35","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_35","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions 基于同态Trapdoor函数的短公钥短签名
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_11
Jacob Alperin-Sheriff
{"title":"Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions","authors":"Jacob Alperin-Sheriff","doi":"10.1007/978-3-662-46447-2_11","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_11","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116865705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case 量子货币方案的代数密码分析——无噪声情况
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_9
M. Pena, J. Faugère, Ludovic Perret
{"title":"Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case","authors":"M. Pena, J. Faugère, Ludovic Perret","doi":"10.1007/978-3-662-46447-2_9","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132321693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Predicate Encryption for Multi-dimensional Range Queries from Lattices 多维格范围查询的谓词加密
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_34
Romain Gay, Pierrick Méaux, H. Wee
{"title":"Predicate Encryption for Multi-dimensional Range Queries from Lattices","authors":"Romain Gay, Pierrick Méaux, H. Wee","doi":"10.1007/978-3-662-46447-2_34","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_34","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116245149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Faster ECC over mathbb F_2^521-1 更快的ECC在mathbb F_2^521-1
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_24
R. Granger, M. Scott
{"title":"Faster ECC over mathbb F_2^521-1","authors":"R. Granger, M. Scott","doi":"10.1007/978-3-662-46447-2_24","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_24","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126737250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems MQQ密码系统的多项式时间密钥恢复攻击
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_7
J. Faugère, D. Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
{"title":"A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems","authors":"J. Faugère, D. Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae","doi":"10.1007/978-3-662-46447-2_7","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_7","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130945252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
On the Selective Opening Security of Practical Public-Key Encryption Schemes 实用公钥加密方案的选择性开放安全性研究
International Conference on Theory and Practice of Public Key Cryptography Pub Date : 2015-03-30 DOI: 10.1007/978-3-662-46447-2_2
F. Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
{"title":"On the Selective Opening Security of Practical Public-Key Encryption Schemes","authors":"F. Heuer, Tibor Jager, Eike Kiltz, Sven Schäge","doi":"10.1007/978-3-662-46447-2_2","DOIUrl":"https://doi.org/10.1007/978-3-662-46447-2_2","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115265410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信