History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 47 total

One-out-of-many proofs: or how to leak a secret and spend a coin. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 253-280 (2015).
WorldCat.org
1
Fully structure-preserving signatures and shrinking commitments. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 35-65 (2015).
WorldCat.org
2
Anonymous transferable e-cash. (English)
Katz, Jonathan (ed.), Public-key cryptography ‒ PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 ‒ April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 101-124 (2015).
WorldCat.org
3
A Messy State of the Union: Taming the Composite State Machines of TLS. (English)
IEEE Symposium on Security and Privacy, 535-552(2015)
WorldCat.org
4
(De-)Constructing TLS 1.3. (English)
INDOCRYPT, 85-102(2015)
WorldCat.org
5
Accountable Metadata-Hiding Escrow: A Group Signature Case Study. (English)
PoPETs 2015, N0. 2, 206-221(2015)
WorldCat.org
6
Observing and Preventing Leakage in MapReduce. (English)
ACM Conference on Computer and Communications Security, 1570-1581(2015)
WorldCat.org
7
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions. (English)
ASIACRYPT (2), 262-288(2015)
WorldCat.org
8
Geppetto: Versatile Verifiable Computation. (English)
IEEE Symposium on Security and Privacy, 253-270(2015)
WorldCat.org
9
Square span programs with applications to succinct NIZK arguments. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 532-550 (2014).
WorldCat.org
10
Proving the TLS handshake secure (as it is). (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 235-255 (2014).
WorldCat.org
11
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. (English)
CSF, 199-213(2014)
WorldCat.org
12
Selective disclosure in Datalog-based trust management. (English)
Accorsi, Rafael (ed.) et al., Security and trust management. 9th international workshop, STM 2013, Egham, UK, September 12‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41097-0/pbk). Lecture Notes in Computer Science 8203, 160-175 (2013).
WorldCat.org
13
Anonymity-preserving public-key encryption: A constructive approach. (English)
De Cristofaro, Emiliano (ed.) et al., Privacy enhancing technologies. 13th international symposium, PETS 2013, Bloomington, IN, USA, July 10‒12, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39076-0/pbk). Lecture Notes in Computer Science 7981, 19-39 (2013).
WorldCat.org
14
Verifiable elections that scale for free. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 479-496 (2013).
WorldCat.org
15
Tagged one-time signatures: tight security and optimal tag size. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 312-331 (2013).
WorldCat.org
16
Succinct malleable NIZKs and an application to compact shuffles. (English)
Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 100-119 (2013).
WorldCat.org
17
Implementing TLS with Verified Cryptographic Security. (English)
IEEE Symposium on Security and Privacy, 445-459(2013)
WorldCat.org
18
Pinocchio coin: building zerocoin from a succinct pairing-based proof system. (English)
PETShop@CCS, 27-30(2013)
WorldCat.org
19
Smart meter aggregation via secret-sharing. (English)
SEGS@CCS, 75-80(2013)
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 47 total

Valid XHTML 1.0 Transitional Valid CSS!