×

Found 34 Documents (Results 1–34)

On secure ratcheting with immediate decryption. (English) Zbl 1519.94182

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13793, 89-118 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Sequential digital signatures for cryptographic software-update authentication. (English) Zbl 1524.68045

Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13555, 255-274 (2022).
MSC:  68M25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Encrypt-to-self: securely outsourcing storage. (English) Zbl 1511.68047

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 635-654 (2020).
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of OCB2: attacks on authenticity and confidentiality. (English) Zbl 1456.94089

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11692, 3-31 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lossy trapdoor permutations with improved lossiness. (English) Zbl 1509.94060

Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 230-250 (2019).
MSC:  94A60 05A05
PDFBibTeX XMLCite
Full Text: DOI

Towards bidirectional ratcheted key exchange. (English) Zbl 1420.94090

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 3-32 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hashing solutions instead of generating problems: on the interactive certification of RSA moduli. (English) Zbl 1420.94035

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10770, 403-430 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

KEM combiners. (English) Zbl 1385.94037

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 190-218 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hybrid encryption in a multi-user setting, revisited. (English) Zbl 1385.94038

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 159-189 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the one-per-message unforgeability of (EC)DSA and its variants. (English) Zbl 1406.94052

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70502-6/pbk; 978-3-319-70503-3/ebook). Lecture Notes in Computer Science 10678, 519-534 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Deterring certificate subversion: efficient double-authentication-preventing signatures. (English) Zbl 1400.94117

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 121-151 (2017).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

From identification to signatures, tightly: a framework and generic transforms. (English) Zbl 1407.94083

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 435-464 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Selective opening security from simulatable data encapsulation. (English) Zbl 1407.94119

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 248-277 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptographic enforcement of information flow policies without public information. (English) Zbl 1443.94053

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 389-408 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Cold boot attacks in the discrete logarithm setting. (English) Zbl 1382.94155

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 449-465 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linkable message tagging: solving the key distribution problem of signature schemes. (English) Zbl 1368.94144

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 195-212 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A more cautious approach to security against mass surveillance. (English) Zbl 1382.94087

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 579-598 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Plaintext recovery attacks against WPA/TKIP. (English) Zbl 1382.94152

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 325-349 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Even more practical secure logging: tree-based seekable sequential key generators. (English) Zbl 1443.94074

Kutyłowski, Mirosław (ed.) et al., Computer security – ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7–11, 2014. Proceedings, Part II. Berlin: Springer. Lect. Notes Comput. Sci. 8713, 37-54 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Double-authentication-preventing signatures. (English) Zbl 1443.94100

Kutyłowski, Mirosław (ed.) et al., Computer security – ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7–11, 2014. Proceedings, Part I. Berlin: Springer. Lect. Notes Comput. Sci. 8712, 436-453 (2014).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English) Zbl 1306.94082

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ASICS: Authenticated key exchange security incorporating certification systems. (English) Zbl 1443.94089

Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8134, 381-399 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Practical secure logging: seekable sequential key generators. (English) Zbl 1443.94073

Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8134, 111-128 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Simple, efficient and strongly KI-secure hierarchical key assignment schemes. (English) Zbl 1312.94050

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 101-114 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Publicly verifiable ciphertexts. (English) Zbl 1344.94047

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 393-410 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Private discovery of common social contacts. (English) Zbl 1443.94054

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 147-165 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Privacy-preserving group discovery with linear complexity. (English) Zbl 1443.94095

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6123, 420-437 (2010).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Affiliation-hiding key exchange with untrusted group authorities. (English) Zbl 1443.94097

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6123, 402-419 (2010).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Redactable signatures for tree-structured data: definitions and constructions. (English) Zbl 1315.94112

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 87-104 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software