History
1
100


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 100 total

Group signatures with message-dependent opening in the standard model. (English)
Benaloh, Josh (ed.), Topics in cryptology ‒ CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 286-306 (2014).
WorldCat.org
1
Traceable group encryption. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 592-610 (2014).
WorldCat.org
2
Non-malleability from malleability: simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures. (English)
Nguyen, Phong Q. (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11‒15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 514-532 (2014).
WorldCat.org
3
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares. (English)
PODC, 303-312(2014)
WorldCat.org
4
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security. (English)
ASIACRYPT (2), 1-21(2014)
WorldCat.org
5
Addition with Blinded Operands. (English)
COSADE, 41-55(2014)
WorldCat.org
6
Toward practical group encryption. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 237-252 (2013).
WorldCat.org
7
A scalable scheme for privacy-preserving aggregation of time-series data. (English)
Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 111-125 (2013).
WorldCat.org
8
On elliptic curve paillier schemes. (English)
Muntean, Traian (ed.) et al., Algebraic informatics. 5th international conference, CAI 2013, Porquerolles, France, September 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40662-1/pbk). Lecture Notes in Computer Science 8080, 6 (2013).
WorldCat.org
9
Linearly homomorphic structure-preserving signatures and their applications. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 289-307 (2013).
WorldCat.org
10
Efficient cryptosystems from $2^{k }$-th power residue symbols. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 76-92 (2013).
WorldCat.org
11
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. (English)
IEEE Symposium on Security and Privacy, 334-348(2013)
WorldCat.org
12
Privacy-preserving matrix factorization. (English)
ACM Conference on Computer and Communications Security, 801-812(2013)
WorldCat.org
13
Partial key exposure on RSA with private exponents larger than $N$. (English)
Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 369-380 (2012).
WorldCat.org
14
Fault analysis in cryptography. Foreword by Dan Boneh. (English)
Information Security and Cryptography. Berlin: Springer (ISBN 978-3-642-29655-0/hbk; 978-3-642-29656-7/ebook). xvi, 354~p. EUR~94.95/net; SFR~126.50; \sterling~85.00/hbk (2012).
WorldCat.org
15
On Quisquater’s multiplication algorithm. (English)
Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 3-7 (2012).
WorldCat.org
16
A Method for Preventing "Skipping" Attacks. (English)
IEEE Symposium on Security and Privacy Workshops, 12-15(2012)
WorldCat.org
17
Security aspects in information technology. First international conference, InfoSecHiComNet 2011, Haldia, India, October 19‒22, 2011. Proceedings. (English)
Lecture Notes in Computer Science 7011. Berlin: Springer (ISBN 978-3-642-24585-5/pbk). xiv, 187~p. EUR~49.22 (2011).
WorldCat.org
18
Memory-constrained implementations of elliptic curve cryptography in co-$Z$ coordinate repre\-sentation. (English)
Nitaj, Abderrahmane (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5‒7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 170-187 (2011).
WorldCat.org
19
Notions and relations for RKA-secure permutation and function families. (English)
Des. Codes Cryptography 60, No. 1, 15-35 (2011).
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 100 total

Valid XHTML 1.0 Transitional Valid CSS!