History
1
110


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 110 total

Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares. (English)
Theor. Comput. Sci. 645, 1-24 (2016).
WorldCat.org
1
Secure ElGamal-type cryptosystems without message encoding. (English)
Ryan, Peter Y.A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 470-478 (2016).
WorldCat.org
2
Identity-based cryptosystems and quadratic residuosity. (English)
Cheng, Chen-Mou (ed.) et al., Public-key cryptography ‒ PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6‒9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 225-254 (2016).
WorldCat.org
3
Inversion-free arithmetic on elliptic curves through isomorphisms. (English)
J. Cryptographic Engineering 6, N0. 3, 187-199(2016)
WorldCat.org
4
Compactly hiding linear spans. Tightly secure constant-size simulation-sound QA-NIZK proofs and applications. (English)
Iwata, Tetsu (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 ‒ December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 681-707 (2015).
WorldCat.org
5
The distributions of individual bits in the output of multiplicative operations. (English)
Cryptogr. Commun. 7, No. 1, 71-90, electronic only (2015).
WorldCat.org
6
Linearly homomorphic structure-preserving signatures and their applications. (English)
Des. Codes Cryptography 77, No. 2-3, 441-477 (2015).
WorldCat.org
7
Secure efficient history-hiding append-only signatures in the standard model. (English)
Katz, Jonathan (ed.), Public-key cryptography ‒ PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 ‒ April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 450-473 (2015).
WorldCat.org
8
Smart card research and advanced applications. 13th international conference, CARDIS 2014, Paris, France, November 5‒7, 2014. Revised selected papers. (English)
Lecture Notes in Computer Science 8968. Cham: Springer (ISBN 978-3-319-16762-6/pbk; 978-3-319-16763-3/ebook). x, 261~p. (2015).
WorldCat.org
9
A Key-private Cryptosystem from the Quadratic Residuosity. (English)
SECRYPT, 398-404(2015)
WorldCat.org
10
Addition with blinded operands. (English)
Prouff, Emmanuel (ed.), Constructive side-channel analysis and secure design. 5th international workshop, COSADE 2014, Paris, France, April 13‒15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-10174-3/pbk; 978-3-319-10175-0/ebook). Lecture Notes in Computer Science 8622, 41-55 (2014).
WorldCat.org
11
Born and raised distributively, fully distributed non-interactive adaptively-secure threshold signatures with short shares. (English)
Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15‒18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 303-312 (2014).
WorldCat.org
12
Concise multi-challenge CCA-secure encryption and signatures with almost tight security. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 1-21 (2014).
WorldCat.org
13
Non-malleability from malleability: simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures. (English)
Nguyen, Phong Q. (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11‒15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 514-532 (2014).
WorldCat.org
14
Group signatures with message-dependent opening in the standard model. (English)
Benaloh, Josh (ed.), Topics in cryptology ‒ CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 286-306 (2014).
WorldCat.org
15
Traceable group encryption. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 592-610 (2014).
WorldCat.org
16
Toward practical group encryption. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 237-252 (2013).
WorldCat.org
17
A scalable scheme for privacy-preserving aggregation of time-series data. (English)
Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 111-125 (2013).
WorldCat.org
18
On elliptic curve Paillier schemes. (Abstract). (English)
Muntean, Traian (ed.) et al., Algebraic informatics. 5th international conference, CAI 2013, Porquerolles, France, September 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40662-1/pbk). Lecture Notes in Computer Science 8080, 6 (2013).
WorldCat.org
19
Linearly homomorphic structure-preserving signatures and their applications. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 289-307 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 110 total

Valid XHTML 1.0 Transitional Valid CSS!