History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 41 total

Proving the TLS handshake secure (as it is). (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 235-255 (2014).
WorldCat.org
1
Square Span Programs with Applications to Succinct NIZK Arguments. (English)
ASIACRYPT (1), 532-550(2014)
WorldCat.org
2
Verifiable elections that scale for free. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 479-496 (2013).
WorldCat.org
4
Tagged one-time signatures: tight security and optimal tag size. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 312-331 (2013).
WorldCat.org
5
Succinct malleable NIZKs and an application to compact shuffles. (English)
Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 100-119 (2013).
WorldCat.org
6
Selective disclosure in Datalog-based trust management. (English)
Accorsi, Rafael (ed.) et al., Security and trust management. 9th international workshop, STM 2013, Egham, UK, September 12‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41097-0/pbk). Lecture Notes in Computer Science 8203, 160-175 (2013).
WorldCat.org
7
Anonymity-preserving public-key encryption: A constructive approach. (English)
De Cristofaro, Emiliano (ed.) et al., Privacy enhancing technologies. 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10‒12, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39076-0/pbk). Lecture Notes in Computer Science 7981, 19-39 (2013).
WorldCat.org
8
Implementing TLS with Verified Cryptographic Security. (English)
IEEE Symposium on Security and Privacy, 445-459(2013)
WorldCat.org
9
Anonymity-Preserving Public-Key Encryption: A Constructive Approach. (English)
Privacy Enhancing Technologies, 19-39(2013)
WorldCat.org
10
Selective Disclosure in Datalog-Based Trust Management. (English)
STM, 160-175(2013)
WorldCat.org
11
Pinocchio coin: building zerocoin from a succinct pairing-based proof system. (English)
PETShop@CCS, 27-30(2013)
WorldCat.org
12
Smart meter aggregation via secret-sharing. (English)
SEGS@CCS, 75-80(2013)
WorldCat.org
13
Succinct malleable nizks and an application to compact shuffles. (English)
Huang, Tingwen (ed.) et al., Neural information processing. 19th international conference, ICONIP 2012, Doha, Qatar, November 12‒15, 2012. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-34474-9/pbk). Lecture Notes in Computer Science 7663, 100-119 (2012).
WorldCat.org
14
Private client-side profiling with random forests and hidden Markov models. (English)
Fischer-Hübner, Simone (ed.) et al., Privacy enhancing technologies. 12th international symposium, PETS 2012, Vigo, Spain, July 11‒13, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31679-1/pbk). Lecture Notes in Computer Science 7384, 18-37 (2012).
WorldCat.org
15
Constant-size structure-preserving signatures: generic constructions and simple assumptions. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 4-24 (2012).
WorldCat.org
16
A new hash-and-sign approach and structure-preserving signatures from DLIN. (English)
Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 131-148 (2012).
WorldCat.org
17
Malleable proof systems and applications. (English)
Pointcheval, David (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15‒19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 281-300 (2012).
WorldCat.org
18
On the non-malleability of the fiat-shamir transform. (English)
Galbraith, Steven (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 60-79 (2012).
WorldCat.org
19
On the Non-malleability of the Fiat-Shamir Transform. (English)
INDOCRYPT, 60-79(2012)
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 41 total

Valid XHTML 1.0 Transitional Valid CSS!