History
1
106


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 106 total

The distributions of individual bits in the output of multiplicative operations. (English)
Cryptogr. Commun. 7, No. 1, 71-90 (2015).
WorldCat.org
1
Linearly homomorphic structure-preserving signatures and their applications. (English)
Des. Codes Cryptography 77, No. 2-3, Article ID 79, 441-477 (2015).
WorldCat.org
2
Secure efficient history-hiding append-only signatures in the standard model. (English)
Katz, Jonathan (ed.), Public-key cryptography ‒ PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 ‒ April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 450-473 (2015).
WorldCat.org
3
Smart card research and advanced applications. 13th international conference, CARDIS 2014, Paris, France, November 5‒7, 2014. Revised selected papers. (English)
Lecture Notes in Computer Science 8968. Cham: Springer (ISBN 978-3-319-16762-6/pbk; 978-3-319-16763-3/ebook). x, 261~p. EUR~51.36 (2015).
WorldCat.org
4
Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. (English)
ASIACRYPT (1), 681-707(2015)
WorldCat.org
5
A Key-private Cryptosystem from the Quadratic Residuosity. (English)
SECRYPT, 398-404(2015)
WorldCat.org
6
Born and raised distributively, fully distributed non-interactive adaptively-secure threshold signatures with short shares. (English)
Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15‒18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 303-312 (2014).
WorldCat.org
7
Concise multi-challenge CCA-secure encryption and signatures with almost tight security. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 1-21 (2014).
WorldCat.org
8
Non-malleability from malleability: simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures. (English)
Nguyen, Phong Q. (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11‒15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 514-532 (2014).
WorldCat.org
9
Group signatures with message-dependent opening in the standard model. (English)
Benaloh, Josh (ed.), Topics in cryptology ‒ CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 286-306 (2014).
WorldCat.org
10
Traceable group encryption. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 592-610 (2014).
WorldCat.org
11
Addition with Blinded Operands. (English)
COSADE, 41-55(2014)
WorldCat.org
12
Toward practical group encryption. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 237-252 (2013).
WorldCat.org
13
A scalable scheme for privacy-preserving aggregation of time-series data. (English)
Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 111-125 (2013).
WorldCat.org
14
On elliptic curve Paillier schemes. (Abstract). (English)
Muntean, Traian (ed.) et al., Algebraic informatics. 5th international conference, CAI 2013, Porquerolles, France, September 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40662-1/pbk). Lecture Notes in Computer Science 8080, 6 (2013).
WorldCat.org
15
Linearly homomorphic structure-preserving signatures and their applications. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 289-307 (2013).
WorldCat.org
16
Efficient cryptosystems from $2^k$-th power residue symbols. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 76-92 (2013).
WorldCat.org
17
Privacy-preserving matrix factorization. (English)
ACM Conference on Computer and Communications Security, 801-812(2013)
WorldCat.org
18
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. (English)
IEEE Symposium on Security and Privacy, 334-348(2013)
WorldCat.org
19
Partial key exposure on RSA with private exponents larger than $N$. (English)
Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 369-380 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 106 total

Valid XHTML 1.0 Transitional Valid CSS!