×

Found 189 Documents (Results 1–100)

Secure and efficient delegation of elliptic-curve pairing. (English) Zbl 07314276

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 45-66 (2020).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient and secure delegation to a single malicious server: exponentiation over non-abelian groups. (English) Zbl 1398.94110

Davenport, James H. (ed.) et al., Mathematical software – ICMS 2018. 6th international conference, South Bend, IN, USA, July 24–27, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-96417-1/pbk; 978-3-319-96418-8/ebook). Lecture Notes in Computer Science 10931, 137-146 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Stochastic comparisons of cumulative entropies. (English) Zbl 1312.62011

Li, Haijun (ed.) et al., Stochastic orders in reliability and risk. In honor of Professor Moshe Shaked. Based on the talks presented at the international workshop on stochastic orders in reliability and risk management, SORR2011, Xiamen, China, June 27–29, 2011. New York, NY: Springer (ISBN 978-1-4614-6891-2/hbk; 978-1-4614-6892-9/ebook). Lecture Notes in Statistics 208. Proceedings, 167-182 (2013).
PDFBibTeX XMLCite
Full Text: DOI

Visual cryptography from halftone error diffusion. (English) Zbl 1398.94094

Cimato, Stelvio (ed.) et al., Visual cryptography and secret image sharing. Boca Raton, FL: CRC Press (ISBN 978-1-138-07604-4/pbk; 978-1-4398-3721-4/hbk; 978-1-4398-3722-1/ebook). Digital Imaging and Computer Vision, 1-29 (2012).
MSC:  94A60 94A62 94A08
PDFBibTeX XMLCite

Zero-knowledge proofs via polynomial representations. (English) Zbl 1365.68264

Rovan, Branislav (ed.) et al., Mathematical foundations of computer science 2012. 37th international symposium, MFCS 2012, Bratislava, Slovakia, August 27–31, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32588-5/pbk). Lecture Notes in Computer Science 7464, 335-347 (2012).
MSC:  68Q15 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the damped geometric telegrapher’s process. (English) Zbl 1238.91068

Perna, Cira (ed.) et al., Mathematical and statistical methods for actuarial sciences and finance. Selected papers based on the presentations at the MAF2010 conference, Ravello, Italy, April 7–9, 2010. Milano: Springer (ISBN 978-88-470-2341-3/hbk). 175-182 (2012).
MSC:  91B25 91G20 60J70
PDFBibTeX XMLCite

Combinatorial group testing for corruption localizing hashing. (English) Zbl 1353.94046

Fu, Bin (ed.) et al., Computing and combinatorics. 17th annual international conference, COCOON 2011, Dallas, TX, USA, August 14–16, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22684-7/pbk). Lecture Notes in Computer Science 6842, 579-591 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Foundations of optical encryption: Formal modeling and achieving Shannon secrecy. (English) Zbl 1253.68116

Calude, Cristian S. (ed.) et al., Unconventional computation. 8th international conference, UC 2009, Ponta Delgada, Portugal, September 7–11, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03744-3/pbk). Lecture Notes in Computer Science 5715, 125-142 (2009).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Concurrently non-malleable black-box zero knowledge in the bare public-key model. (English) Zbl 1248.94063

Frid, Anna (ed.) et al., Computer science – theory and applications. Fourth international computer science symposium in Russia, CSR 2009, Novosibirsk, Russia, August 18–23, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03350-6/pbk). Lecture Notes in Computer Science 5675, 80-91 (2009).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Minimal assumptions and round complexity for concurrent zero-knowledge in the bare public-key model. (English) Zbl 1248.94064

Ngo, Hung Q. (ed.), Computing and combinatorics. 15th annual international conference, COCOON 2009, Niagara Falls, NY, USA, July 13–15, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02881-6/pbk). Lecture Notes in Computer Science 5609, 127-137 (2009).
MSC:  94A60 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

Proceedings of the third workshop on cryptography for ad-hoc networks (WCAN 2007), Wrocław, Poland, July 8, 2007. (English) Zbl 1276.94002

Electronic Notes in Theoretical Computer Science 192, No. 2. Amsterdam: Elsevier. 53 p., electronic only (2008).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: Link

3-message NP arguments in the BPK model with optimal soundness and zero-knowledge. (English) Zbl 1183.94029

Hong, Seok-Hee (ed.) et al., Algorithms and computation. 19th international symposium, ISAAC 2008, Gold Coast, Australia, December 15–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-92181-3/pbk). Lecture Notes in Computer Science 5369, 615-627 (2008).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Succinct NP proofs from an extractability assumption. (English) Zbl 1142.68370

Beckmann, Arnold (ed.) et al., Logic and theory of algorithms. 4th conference on computability in Europe, CiE 2008, Athens, Greece, June 15–20, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69405-2/pbk). Lecture Notes in Computer Science 5028, 175-185 (2008).
MSC:  68Q25 68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure node discovery in ad-hoc networks and applications. (English) Zbl 1277.68035

Di Crescenzo, Giovanni (ed.) et al., Proceedings of the second workshop on cryptography for ad-hoc networks (WCAN 2006), Venice, Italy, July 16, 2006. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 171, No. 1, 43-55 (2007).
MSC:  68M12 68M10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Proceedings of the second workshop on cryptography for ad-hoc networks (WCAN 2006), Venice, Italy, July 16, 2006. (English) Zbl 1273.68028

Electronic Notes in Theoretical Computer Science 171, No. 1. Amsterdam: Elsevier. 120 p., electronic only (2007).
PDFBibTeX XMLCite
Full Text: Link

Public key encryption with searchable keywords based on Jacobi symbols. (English) Zbl 1153.94367

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 282-296 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. (English) Zbl 1140.94003

Lecture Notes in Computer Science 4107. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). xi, 327 p. (2006).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

Software