×

Found 6 Documents (Results 1–6)

Improved lattice enumeration algorithms by primal and dual reordering methods. (English) Zbl 07628048

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 159-174 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in information and computer security. Third international workshop on security, IWSEC 2008, Kagawa, Japan, November 25–27, 2008. Proceedings. (English) Zbl 1152.68308

Lecture Notes in Computer Science 5312. Berlin: Springer (ISBN 978-3-540-89597-8/pbk). xii, 299 p. (2008).
PDFBibTeX XMLCite
Full Text: DOI

Statistical zero knowledge protocols to prove modular polynomial relations. (English) Zbl 0880.94007

Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 16-30 (1997).
MSC:  94A60 68P25
PDFBibTeX XMLCite

How to date blind signatures. (English) Zbl 0994.68588

Kim, Kwangjo (ed.) et al., Advances in cryptology - ASIACRYPT ’96. International conference on the theory and applications of cryptology and information security, Kyongju, Korea, November 3-7, 1996. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1163, 244-251 (1996).
MSC:  68U99 68P25 94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software