×

Found 12 Documents (Results 1–12)

On the hardness of the Mersenne Low Hamming Ratio assumption. (English) Zbl 1454.94050

Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 166-174 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Reusing nonces in Schnorr signatures (and keeping it secure...). (English) Zbl 1500.94065

Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 224-241 (2017).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms. (English) Zbl 1500.94018

Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 206-223 (2017).
MSC:  94A60 68Q10
PDFBibTeX XMLCite
Full Text: DOI

Human public-key encryption. (English) Zbl 1410.94066

Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 494-505 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Honey encryption for language. Robbing Shannon to pay Turing? (English) Zbl 1410.94046

Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 127-144 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Legally fair contract signing without keystones. (English) Zbl 1346.94142

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 175-190 (2016).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Slow motion zero knowledge identifying with colliding commitments. (English) Zbl 1409.94872

Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 381-396 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Failure is also an option. (English) Zbl 1405.94040

Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 161-165 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Filter Results by …

Document Type

Year of Publication

Main Field

Software