×

Found 12 Documents (Results 1–12)

On private information retrieval supporting range queries. (English) Zbl 1511.68044

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 674-694 (2020).
PDFBibTeX XMLCite
Full Text: DOI

Token-based multi-input functional encryption. (English) Zbl 1421.94036

Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 147-164 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of the Schnorr signature scheme and DSA against related-key attacks. (English) Zbl 1384.94089

Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 20-35 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-party computation with small shuffle complexity using regular polygon cards. (English) Zbl 1388.94078

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 127-146 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Dynamic threshold public-key encryption with decryption consistency from static assumptions. (English) Zbl 1358.94077

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 77-92 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. (English) Zbl 1296.94120

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 812-831 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of dynamic group signatures: preventing signature hijacking. (English) Zbl 1291.94196

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 715-732 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. (English) Zbl 1290.94158

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 243-261 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-transferable user certification secure against authority information leaks and impersonation attacks. (English) Zbl 1428.94112

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 413-430 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software