×

Found 241 Documents (Results 1–100)

Rainfall scattered data interpolation using rational quartic triangular patches. (English) Zbl 1469.86001

Karim, Samsul Ariffin Abdul (ed.), Theoretical, modelling and numerical simulations toward Industry 4.0. Singapore: Springer. Stud. Syst. Decis. Control 319, 1-19 (2021).
PDFBibTeX XMLCite
Full Text: DOI

Time-space tradeoffs and short collisions in Merkle-Damgård hash functions. (English) Zbl 1503.94021

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 157-186 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Matrix PRFs: constructions, attacks, and applications to obfuscation. (English) Zbl 1455.94138

Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 55-80 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Strengthening mathematics in the developing world. (English) Zbl 1441.01038

Sirakov, Boyan (ed.) et al., Proceedings of the international congress of mathematicians, ICM 2018, Rio de Janeiro, Brazil, August 1–9, 2018. Volume I. Plenary lectures. Hackensack, NJ: World Scientific; Rio de Janeiro: Sociedade Brasileira de Matemática (SBM). 1049-1064 (2018).
MSC:  01A80
PDFBibTeX XMLCite
Full Text: DOI

Improved inner-product encryption with adaptive security and full attribute-hiding. (English) Zbl 1446.94114

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 673-702 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Traitor-tracing from LWE made simple and attribute-based. (English) Zbl 1430.94065

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 341-369 (2018).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

GGH15 beyond permutation branching programs: proofs, attacks, and candidates. (English) Zbl 1436.94046

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 577-607 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Unbounded ABE via bilinear entropy expansion, revisited. (English) Zbl 1423.94062

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 503-534 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Targeted homomorphic attribute-based encryption. (English) Zbl 1394.94928

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53643-8/pbk; 978-3-662-53644-5/ebook). Lecture Notes in Computer Science 9986, 330-360 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security against related randomness attacks via reconstructive extractors. (English) Zbl 1376.94042

Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 23-40 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Implicit zero-knowledge arguments and applications to the malicious setting. (English) Zbl 1351.94026

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 107-129 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Improved dual system ABE in prime-order groups via predicate encodings. (English) Zbl 1375.94109

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 595-624 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Semi-adaptive attribute-based encryption and improved delegation for Boolean formula. (English) Zbl 1378.94030

Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 277-297 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Fully, (almost) tightly secure IBE and dual system groups. (English) Zbl 1311.94072

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 435-460 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient cryptography from minimal assumptions. (English) Zbl 1306.94061

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 160-176 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS. (English) Zbl 1314.94061

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 73-88 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Shorter IBE and signatures via asymmetric pairings. (English) Zbl 1305.94038

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 122-140 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient password authenticated key exchange via oblivious transfer. (English) Zbl 1296.94148

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 449-466 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Fourier analysis and swarm intelligence for stochastic optimization of discrete functions. (English) Zbl 1436.62016

Lechevallier, Yves (ed.) et al., Proceedings of COMPSTAT’2010. 19th international conference on computational statistics, Paris, France, August 22–27, 2010. Keynote, invited and contributed papers. Heidelberg: Physica Verlag. 525-532 (2010).
MSC:  62-08 90C59
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software