×

Found 16 Documents (Results 1–16)

General linear group action on tensors: a candidate for post-quantum cryptography. (English) Zbl 1447.94047

Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 251-281 (2019).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

Quantum security of NMAC and related constructions. PRF domain extension against quantum attacks. (English) Zbl 1410.94107

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 283-309 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. (English) Zbl 1333.68013

Lecture Notes in Computer Science 9558. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). xiii, 374 p. (2016).
PDFBibTeX XMLCite
Full Text: DOI

Generic hardness of the multiple discrete logarithm problem. (English) Zbl 1371.94661

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 817-836 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Homomorphic authenticated encryption secure against chosen-ciphertext attack. (English) Zbl 1317.94114

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 173-192 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Batch fully homomorphic encryption over the integers. (English) Zbl 1306.94040

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 315-335 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous signatures revisited. (English) Zbl 1267.94129

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 140-153 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

A simple variant of the Merkle-Damgård scheme with a permutation. (English) Zbl 1153.94389

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 113-129 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the full HAVAL with 4 and 5 passes. (English) Zbl 1234.94071

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 89-110 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collision search attack for 53-step HAS-160. (English) Zbl 1272.94023

Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 286-295 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Finding collision on 45-step HAS-160. (English) Zbl 1185.94071

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 146-155 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of a divisor class group based public-key cryptosystem. (English) Zbl 1125.94334

Buell, Duncan (ed.), Algorithmic number theory. 6th international symposium, ANTS-VI, Burlington, VT, USA, June 13–18, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22156-5/pbk). Lecture Notes in Computer Science 3076, 442-450 (2004).
MSC:  94A60 13C20
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software