×

Found 37 Documents (Results 1–37)

Discrete maximum principle and positivity certificates for the Bernstein dual Petrov-Galerkin method. (English) Zbl 07820187

Zeidan, Dia (ed.) et al., Mathematics and computation. IACMC 2022. Selected papers based on the presentations at the 7th international Arab conference on mathematics and computations, Zarqa, Jordan, May 11–13, 2022. Singapore: Springer. Springer Proc. Math. Stat. 418, 195-211 (2023).
MSC:  00B25
PDFBibTeX XMLCite
Full Text: DOI

Efficient two-party exponentiation from quotient transfer. (English) Zbl 1509.68081

Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 643-662 (2022).
MSC:  68Q10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Forward-secure public key encryption without key update from proof-of-stake blockchain. (English) Zbl 1514.94122

Adhikari, Avishek (ed.) et al., Progress in cryptology – INDOCRYPT 2021. 22nd International conference on cryptology in India, Jaipur, India, December 12–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13143, 436-461 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On private information retrieval supporting range queries. (English) Zbl 1511.68044

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 674-694 (2020).
PDFBibTeX XMLCite
Full Text: DOI

Field extension in secret-shared form and its applications to efficient secure computation. (English) Zbl 1439.94037

Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 343-361 (2019).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Token-based multi-input functional encryption. (English) Zbl 1421.94036

Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 147-164 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related randomness security for public key encryption, revisited. (English) Zbl 1385.94060

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 280-311 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Backdoors in pseudorandom number generators: possibility and impossibility results. (English) Zbl 1379.94036

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 403-432 (2016).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

On the security of the Schnorr signature scheme and DSA against related-key attacks. (English) Zbl 1384.94089

Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 20-35 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-party computation with small shuffle complexity using regular polygon cards. (English) Zbl 1388.94078

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 127-146 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security against related randomness attacks via reconstructive extractors. (English) Zbl 1376.94042

Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 23-40 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Dynamic threshold public-key encryption with decryption consistency from static assumptions. (English) Zbl 1358.94077

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 77-92 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Plaintext recovery attacks against WPA/TKIP. (English) Zbl 1382.94152

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 325-349 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English) Zbl 1306.94082

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related randomness attacks for public key encryption. (English) Zbl 1335.94072

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 465-482 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. (English) Zbl 1296.94120

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 812-831 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of dynamic group signatures: preventing signature hijacking. (English) Zbl 1291.94196

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 715-732 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. (English) Zbl 1290.94158

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 243-261 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the joint security of encryption and signature, revisited. (English) Zbl 1227.94061

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 161-178 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Non-transferable user certification secure against authority information leaks and impersonation attacks. (English) Zbl 1428.94112

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 413-430 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On-line non-transferable signatures revisited. (English) Zbl 1291.94199

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 369-386 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient constructions of signcryption schemes and signcryption composability. (English) Zbl 1252.94085

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 321-342 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Proxy signatures secure against proxy key exposure. (English) Zbl 1162.94400

Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 141-161 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient chosen-ciphertext secure identity-based encryption with wildcards. (English) Zbl 1213.94084

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 274-292 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient identity-based signatures secure in the standard model. (English) Zbl 1176.94056

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 207-222 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Transactional peer-to-peer information processing: The AMOR approach. (English) Zbl 1022.68659

Chen, Ming-Syan (ed.) et al., Mobile data management. 4th international conference, MDM 2003, Melbourne, Australia, January 21-24, 2003. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2574, 356-362 (2003).
PDFBibTeX XMLCite
Full Text: Link

Supporting reliable transactional business processes by publish/subscribe techniques. (English) Zbl 1030.68842

Casati, Fabio (ed.) et al., Technologies for E-services. 2nd international workshop, TES 2001, Rome, Italy, September 14-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2193, 118-131 (2001).
MSC:  68U99 68U35 68M10
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software