×

Found 160 Documents (Results 1–100)

Sustainable cryptography. (English) Zbl 1459.94100

Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer. Math. Ind. (Tokyo) 33, 3 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On lattice-based interactive protocols: an approach with less or no aborts. (English) Zbl 1464.94024

Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 41-61 (2020).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

BLAZE: practical lattice-based blind signatures for privacy-preserving applications. (English) Zbl 1459.94155

Bonneau, Joseph (ed.) et al., Financial cryptography and data security. 24th international conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12059, 484-502 (2020).
PDFBibTeX XMLCite
Full Text: DOI

Function-dependent commitments from homomorphic authenticators. (English) Zbl 1443.68059

Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 399-418 (2019).
MSC:  68P27 94A62
PDFBibTeX XMLCite
Full Text: DOI

Algebra, codes and cryptology. Proceedings of the first international conference, A2C 2019, in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019. (English) Zbl 1444.94002

Communications in Computer and Information Science 1133. Cham: Springer (ISBN 978-3-030-36236-2/pbk; 978-3-030-36237-9/ebook). xii, 237 p. (2019).
PDFBibTeX XMLCite
Full Text: DOI

Context hiding multi-key linearly homomorphic authenticators. (English) Zbl 1453.94138

Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 493-513 (2019).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. (English) Zbl 1428.94007

Lecture Notes in Computer Science 11627. Cham: Springer (ISBN 978-3-030-23695-3/pbk; 978-3-030-23696-0/ebook). xvi, 449 p. (2019).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Efficient proactive secret sharing for large data via concise vector commitments. (English) Zbl 1461.94092

Carlet, Claude (ed.) et al., Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. Cham: Springer. Lect. Notes Comput. Sci. 11445, 171-194 (2019).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

\(\mathsf{ELSA}\): efficient long-term secure storage of large datasets. (English) Zbl 1433.68119

Lee, Kwangsu (ed.), Information security and cryptology – ICISC 2018. 21st international conference, Seoul, South Korea, November 28–30, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11396, 269-286 (2019).
MSC:  68P20 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Function-dependent commitments for verifiable multi-party computation. (English) Zbl 1515.68121

Chen, Liqun (ed.) et al., Information security. 21st international conference, ISC 2018, Guildford, UK, September 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11060, 289-307 (2018).
PDFBibTeX XMLCite
Full Text: DOI

CHQS: publicly verifiable homomorphic signatures beyond the linear case. (English) Zbl 1518.94125

Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 213-228 (2018).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential power analysis of XMSS and SPHINCS. (English) Zbl 1450.94038

Fan, Junfeng (ed.) et al., Constructive side-channel analysis and secure design. 9th international workshop, COSADE 2018, Singapore, April 23–24, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10815, 168-188 (2018).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Performing computations on hierarchically shared secrets. (English) Zbl 1423.94110

Joux, Antoine (ed.) et al., Progress in cryptology – AFRICACRYPT 2018. 10th international conference on cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10831, 141-161 (2018).
MSC:  94A60 94A62 81P94
PDFBibTeX XMLCite
Full Text: DOI

Long-term secure time-stamping using preimage-aware hash functions (short version). (English) Zbl 1439.94081

Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 251-260 (2017).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Revisiting TESLA in the quantum random oracle model. (English) Zbl 1437.94047

Lange, Tanja (ed.) et al., Post-quantum cryptography. 8th international workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10346, 143-162 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Recovering short generators of principal fractional ideals in cyclotomic fields of conductor \(p^\alpha q^\beta\). (English) Zbl 1421.94058

Patra, Arpita (ed.) et al., Progress in cryptology – INDOCRYPT 2017. 18th international conference on cryptology in India, Chennai, India, December 10–13, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10698, 346-368 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A linearly homomorphic signature scheme from weaker assumptions. (English) Zbl 1397.94095

O’Neill, Máire (ed.), Cryptography and coding. 16th IMA international conference, IMACC 2017, Oxford, UK, December 12–14, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71044-0/pbk; 978-3-319-71045-7/ebook). Lecture Notes in Computer Science 10655, 261-279 (2017).
MSC:  94A60 68M11
PDFBibTeX XMLCite
Full Text: DOI Link

Long-term secure commitments via extractable-binding commitments. (English) Zbl 1376.94027

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 65-81 (2017).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Linearly homomorphic authenticated encryption with provable correctness and public verifiability. (English) Zbl 1485.68093

El Hajji, Said (ed.) et al., Codes, cryptology and information security. Second international conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017. Proceedings – in honor of Claude Carlet. Cham: Springer. Lect. Notes Comput. Sci. 10194, 142-160 (2017).
MSC:  68P25 68M11 94A60
PDFBibTeX XMLCite
Full Text: DOI

Dynamic and verifiable hierarchical secret sharing. (English) Zbl 1407.94176

Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 24-43 (2016).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Password requirements markup language. (English) Zbl 1405.94067

Liu, Joseph K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 426-439 (2016).
MSC:  94A60 68M11 68P25
PDFBibTeX XMLCite
Full Text: DOI

An efficient lattice-based signature scheme with provably secure instantiation. (English) Zbl 1404.94034

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13–15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 44-60 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack. (English) Zbl 1345.94045

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13–15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 24-43 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Post-quantum cryptography: state of the art. (English) Zbl 1405.94002

Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 88-108 (2016).
PDFBibTeX XMLCite
Full Text: DOI Link

Flow induced by bacterial carpets and transport of microscale loads. (English) Zbl 1338.92068

Jackson, Trachette (ed.) et al., Applications of dynamical systems in biology and medicine. Based on the presentations at the 1st IMA’s Women in Applied Mathematics (WhAM!), research collaboration conference on dynamical systems with applications to biology and medicine, Minneapolis, MN, USA, September 9–13, 2013. New York, NY: Springer (ISBN 978-1-4939-2781-4/hbk; 978-1-4939-2782-1/ebook). The IMA Volumes in Mathematics and its Applications 158, 35-53 (2015).
MSC:  92C99 76D07
PDFBibTeX XMLCite
Full Text: DOI

Augmented learning with errors: the untapped potential of the error term. (English) Zbl 1415.94427

Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8975, 333-352 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Nearest planes in practice. (English) Zbl 1401.94139

Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 203-215 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of long-lived archiving systems based on the evidence record syntax. (English) Zbl 1329.68098

El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). Lecture Notes in Computer Science 9084, 27-44 (2015).
MSC:  68P25
PDFBibTeX XMLCite
Full Text: DOI

Tuning GaussSieve for speed. (English) Zbl 1370.94512

Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 288-305 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Mutant differential fault analysis of Trivium MDFA. (English) Zbl 1344.94065

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, Korea, December 3–5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 433-446 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Discrete Ziggurat: a time-memory trade-off for sampling from a Gaussian distribution over the integers. (English) Zbl 1362.94024

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 402-417 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improvement and efficient implementation of a lattice-based signature scheme. (English) Zbl 1321.94107

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 48-67 (2014).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the efficiency of provably secure NTRU. (English) Zbl 1306.94036

Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 22-39 (2014).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Towards lattice based aggregate signatures. (English) Zbl 1318.94066

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 336-355 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Forward secure signatures on smart cards. (English) Zbl 1327.94084

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 66-80 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Fast verification for improved versions of the UOV and rainbow signature schemes. (English) Zbl 1306.94086

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 188-202 (2013).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of hash-based tamed transformation and minus signature scheme. (English) Zbl 1306.94080

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 155-164 (2013).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Optimizing guessing strategies for algebraic cryptanalysis with applications to EPCBC. (English) Zbl 1311.94100

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 175-197 (2013).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

Many weak keys for PRINTcipher: fast key recovery and countermeasures. (English) Zbl 1301.94110

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 189-206 (2013).
MSC:  94A60 90C11 90C05
PDFBibTeX XMLCite
Full Text: DOI

On the design of hardware building blocks for modern lattice-based encryption schemes. (English) Zbl 1294.94048

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 512-529 (2012).
MSC:  94A60 68P25 65T50
PDFBibTeX XMLCite
Full Text: DOI

Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. (English) Zbl 1241.94004

Lecture Notes in Computer Science 7293. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). xiv, 734 p. (2012).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48. (English) Zbl 1307.94044

Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 54-75 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

XMSS – a practical forward secure signature scheme based on minimal security assumptions. (English) Zbl 1298.94082

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 117-129 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the security of the Winternitz one-time signature scheme. (English) Zbl 1280.94106

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 363-378 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Linear recurring sequences for the UOV key generation. (English) Zbl 1291.94141

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 335-350 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Practical algebraic cryptanalysis for dragon-based cryptosystems. (English) Zbl 1294.94035

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 140-155 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cyclicrainbow – a multivariate signature scheme with a partially cyclic public key. (English) Zbl 1294.94069

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 33-48 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Towards provable security of the unbalanced oil and vinegar signature scheme under direct attacks. (English) Zbl 1294.94036

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 17-32 (2010).
MSC:  94A60 68Q17 94A62
PDFBibTeX XMLCite
Full Text: DOI

MXL\(_3\): an efficient algorithm for computing Gröbner bases of zero-dimensional ideals. (English) Zbl 1305.94066

Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 87-100 (2010).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

Selecting parameters for the Rainbow signature scheme. (English) Zbl 1286.94084

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 218-240 (2010).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Flexible partial enlargement to accelerate Gröbner basis computation over \(\mathbb{F}_2\). (English) Zbl 1284.94058

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 69-81 (2010).
MSC:  94A60 13P10 68W30
PDFBibTeX XMLCite
Full Text: DOI

Parallel shortest lattice vector enumeration on graphics cards. (English) Zbl 1284.68638

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 52-68 (2010).
MSC:  68W10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure parameters for SWIFFT. (English) Zbl 1273.94343

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 1-17 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic attack on the MQQ public key cryptosystem. (English) Zbl 1287.94087

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 392-401 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hash-based digital signature schemes. (English) Zbl 1161.81318

Bernstein, Daniel J. (ed.) et al., Post-quantum cryptography. First international workshop PQCrypto 2006, Leuven, The Netherland, May 23–26, 2006. Selected papers. Berlin: Springer (ISBN 978-3-540-88701-0/hbk; 978-3-540-88702-7/ebook). 35-93 (2009).
MSC:  81P68 94A60
PDFBibTeX XMLCite
Full Text: DOI

Post-quantum cryptography. First international workshop PQCrypto 2006, Leuven, The Netherland, May 23–26, 2006. Selected papers. (English) Zbl 1155.81007

Berlin: Springer (ISBN 978-3-540-88701-0/hbk; 978-3-540-88702-7/ebook). xiii, 245 p. (2009).
MSC:  81-06 81P68 00B25
PDFBibTeX XMLCite
Full Text: DOI

MXL2: Solving polynomial equations over \(\text{GF}(2)\) using an improved mutant strategy. (English) Zbl 1177.11094

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 203-215 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Explicit hard instances of the shortest vector problem. (English) Zbl 1177.94132

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 79-94 (2008).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Merkle tree traversal revisited. (English) Zbl 1177.94182

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 63-78 (2008).
MSC:  94A62 94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. (English) Zbl 1147.94002

Lecture Notes in Computer Science 5299. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). x, 231 p. (2008).
PDFBibTeX XMLCite
Full Text: DOI

Merkle signatures with virtually unlimited signature capacity. (English) Zbl 1214.94060

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 31-45 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A zero-dimensional Gröbner basis for AES-128. (English) Zbl 1234.94032

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 78-88 (2006).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

CMSS – an improved Merkle signature scheme. (English) Zbl 1175.94106

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 349-363 (2006).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Practical lattice basis sampling reduction. (English) Zbl 1143.11336

Hess, Florian (ed.) et al., Algorithmic number theory. 7th international symposium, ANTS-VII, Berlin, Germany, July 23–28, 2006. Proceedings. Berlin: Springer (ISBN 3-540-36075-1/pbk). Lecture Notes in Computer Science 4076, 222-237 (2006).
PDFBibTeX XMLCite
Full Text: DOI

Block ciphers sensitive to Gröbner basis attacks. (English) Zbl 1125.94013

Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 313-331 (2006).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

A multipurpose delegation proxy for WWW credentials. (English) Zbl 1216.68104

Chadwick, David (ed.) et al., Public key infrastructure. Second European PKI workshop: research and application, EuroPKI 2005, Canterbury, UK, June 30 – July 1, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-28062-6/pbk). Lecture Notes in Computer Science 3545, 1-21 (2005).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Number field cryptography. (English) Zbl 1073.94012

van der Poorten, Alf (ed.) et al., High primes and misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams. Selected papers from the international conference on number theory, Banff, AB, Canada, May 24–30, 2003. Providence, RI: American Mathematical Society (AMS) (ISBN 0-8218-3353-7/hbk). Fields Institute Communications 41, 111-121 (2004).
PDFBibTeX XMLCite

A survey on IQ cryptography. (English) Zbl 0983.94034

Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 1-15 (2001).
MSC:  94A60 11R04 11R29
PDFBibTeX XMLCite

Efficient construction of cryptographically strong elliptic curves. (English) Zbl 0974.11043

Roy, Bimal (ed.) et al., Progress in cryptology - INDOCRYPT 2000. 1st international conference in cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1977, 191-202 (2000).
PDFBibTeX XMLCite

Discrete logarithms: Recent progress. (English) Zbl 1032.11061

Buchmann, Johannes (ed.) et al., Coding theory, cryptography and related areas. Proceedings of an international conference, Guanajuato, Mexico, April 1998. Berlin: Springer. 42-56 (2000).
MSC:  11Y16 94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software