×

Found 33 Documents (Results 1–33)

Beyond Uber: instantiating generic groups via PGGs. (English) Zbl 1519.94046

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13749, 212-242 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The key-dependent message security of key-alternating Feistel ciphers. (English) Zbl 1479.94168

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 351-374 (2021).
MSC:  94A60 05A05
PDFBibTeX XMLCite
Full Text: DOI

Password hashing and preprocessing. (English) Zbl 1479.94317

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 64-91 (2021).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Simpler constructions of asymmetric primitives from obfuscation. (English) Zbl 1492.94104

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 715-738 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards defeating backdoored random oracles: indifferentiability with bounded adaptivity. (English) Zbl 1485.94080

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 241-273 (2020).
MSC:  94A60 68P25 94A05
PDFBibTeX XMLCite
Full Text: DOI

Combiners for backdoored random oracles. (English) Zbl 1436.94039

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 272-302 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Indifferentiable authenticated encryption. (English) Zbl 1440.94088

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 187-220 (2018).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Graded encoding schemes from obfuscation. (English) Zbl 1420.94061

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10770, 371-400 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Modeling random oracles under unpredictable queries. (English) Zbl 1387.94080

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 453-473 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Private functional encryption: indistinguishability-based definitions and constructions from obfuscation. (English) Zbl 1411.94047

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 227-247 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Multilinear maps from obfuscation. (English) Zbl 1388.94030

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 446-473 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A more cautious approach to security against mass surveillance. (English) Zbl 1382.94087

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 579-598 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

The related-key security of iterated Even-Mansour ciphers. (English) Zbl 1382.94102

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 342-363 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The related-key analysis of Feistel constructions. (English) Zbl 1382.94058

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 265-284 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Random-oracle uninstantiability from indistinguishability obfuscation. (English) Zbl 1334.94067

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 428-455 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources. (English) Zbl 1317.94091

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 188-205 (2014).
MSC:  94A60 68Q17 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

On the relationship between functional encryption, obfuscation, and fully homomorphic encryption. (English) Zbl 1317.94080

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 65-84 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Ideal-cipher (ir)reducibility for blockcipher-based hash functions. (English) Zbl 1306.94024

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 426-443 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Robust encryption, revisited. (English) Zbl 1314.94068

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 352-368 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the semantic security of functional encryption schemes. (English) Zbl 1314.94054

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 143-161 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Delegatable homomorphic encryption with applications to secure outsourcing of computation. (English) Zbl 1292.94025

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 296-312 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Polly cracker, revisited. (English) Zbl 1227.94025

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 179-196 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On cipher-dependent related-key attacks in the ideal-cipher model. (English) Zbl 1282.94030

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 128-145 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Strong knowledge extractors for public-key encryption schemes. (English) Zbl 1323.94101

Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 164-181 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles. (English) Zbl 1323.94100

Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 145-163 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Security analysis of standard authentication and key agreement protocols utilising timestamps. (English) Zbl 1246.94021

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 235-253 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Certified encryption revisited. (English) Zbl 1246.94029

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 179-197 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Randomness reuse: Extensions and improvements. (English) Zbl 1154.94372

Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 257-276 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure cryptographic workflow in the standard model. (English) Zbl 1175.94066

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 379-393 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient identity-based key encapsulation to multiple parties. (English) Zbl 1122.94348

Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 428-441 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software