History
1
104


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 104 total

Smart card research and advanced applications. 13th international conference, CARDIS 2014, Paris, France, November 5‒7, 2014. Revised selected papers. (English)
Lecture Notes in Computer Science 8968. Cham: Springer (ISBN 978-3-319-16762-6/pbk; 978-3-319-16763-3/ebook). x, 261~p. EUR~51.36 (2015).
WorldCat.org
1
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model. (English)
Public Key Cryptography, 450-473(2015)
WorldCat.org
2
A Key-private Cryptosystem from the Quadratic Residuosity. (English)
SECRYPT, 398-404(2015)
WorldCat.org
3
The distributions of individual bits in the output of multiplicative operations. (English)
Cryptography and Communications 7, N0. 1, 71-90(2015)
WorldCat.org
4
Concise multi-challenge CCA-secure encryption and signatures with almost tight security. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 1-21 (2014).
WorldCat.org
5
Non-malleability from malleability: simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures. (English)
Nguyen, Phong Q. (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11‒15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 514-532 (2014).
WorldCat.org
6
Group signatures with message-dependent opening in the standard model. (English)
Benaloh, Josh (ed.), Topics in cryptology ‒ CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 286-306 (2014).
WorldCat.org
7
Traceable group encryption. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 592-610 (2014).
WorldCat.org
8
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares. (English)
PODC, 303-312(2014)
WorldCat.org
9
Addition with Blinded Operands. (English)
COSADE, 41-55(2014)
WorldCat.org
10
Toward practical group encryption. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 237-252 (2013).
WorldCat.org
11
A scalable scheme for privacy-preserving aggregation of time-series data. (English)
Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 111-125 (2013).
WorldCat.org
12
On elliptic curve Paillier schemes. (Abstract). (English)
Muntean, Traian (ed.) et al., Algebraic informatics. 5th international conference, CAI 2013, Porquerolles, France, September 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40662-1/pbk). Lecture Notes in Computer Science 8080, 6 (2013).
WorldCat.org
13
Linearly homomorphic structure-preserving signatures and their applications. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 289-307 (2013).
WorldCat.org
14
Efficient cryptosystems from $2^k$-th power residue symbols. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 76-92 (2013).
WorldCat.org
15
Privacy-preserving matrix factorization. (English)
ACM Conference on Computer and Communications Security, 801-812(2013)
WorldCat.org
16
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. (English)
IEEE Symposium on Security and Privacy, 334-348(2013)
WorldCat.org
17
Partial key exposure on RSA with private exponents larger than $N$. (English)
Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 369-380 (2012).
WorldCat.org
18
Fault analysis in cryptography. Foreword by Dan Boneh. (English)
Information Security and Cryptography. Berlin: Springer (ISBN 978-3-642-29655-0/hbk; 978-3-642-29656-7/ebook). xvi, 354~p. EUR~94.95/net; SFR~126.50; \sterling~85.00/hbk (2012).
WorldCat.org
19
On Quisquater’s multiplication algorithm. (English)
Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 3-7 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 104 total

Valid XHTML 1.0 Transitional Valid CSS!