×

Found 63 Documents (Results 1–63)

Beyond software watermarking: traitor-tracing for pseudorandom functions. (English) Zbl 07684807

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 250-280 (2021).
MSC:  68P25 68Nxx 94A60
PDFBibTeX XMLCite
Full Text: DOI

Traceable secret sharing and applications. (English) Zbl 1487.94154

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 718-747 (2021).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

A lattice-based approach to privacy-preserving biometric authentication without relying on trusted third parties. (English) Zbl 1506.94085

Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 297-319 (2017).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Code-based cryptosystems using generalized concatenated codes. (English) Zbl 1384.94097

Kotsireas, Ilias S. (ed.) et al., Applications of computer algebra, Kalamata, Greece, July 20–23, 2015. Cham: Springer (ISBN 978-3-319-56930-7/hbk; 978-3-319-56932-1/ebook). Springer Proceedings in Mathematics & Statistics 198, 397-423 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

On privacy-preserving biometric authentication. (English) Zbl 1379.94050

Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 169-186 (2017).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Revisiting the false acceptance rate attack on biometric visual cryptographic schemes. (English) Zbl 1407.94124

Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 114-125 (2016).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Privacy-preserving fingerprint authentication resistant to hill-climbing attacks. (English) Zbl 1396.94105

Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 44-64 (2016).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Hierarchical identities from group signatures and pseudonymous signatures. (English) Zbl 1405.94046

Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 457-469 (2016).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Variations on minimal linear codes. (English) Zbl 1398.94211

Pinto, Raquel (ed.) et al., Coding theory and applications. 4th international castle meeting, ICMCTA, Palmela Castle, Portugal, September 15–18, 2014. Cham: Springer (ISBN 978-3-319-17295-8/hbk; 978-3-319-17296-5/ebook). CIM Series in Mathematical Sciences 3, 125-131 (2015).
MSC:  94B05
PDFBibTeX XMLCite
Full Text: DOI

Authentication in constrained settings. (English) Zbl 1401.94187

Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 3-12 (2015).
MSC:  94A62 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

The cryptographic power of random selection. (English) Zbl 1292.94096

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 134-150 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the effects of pirate evolution on the design of digital content distribution systems. (English) Zbl 1272.94042

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). Lecture Notes in Computer Science 6639, 223-237 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Another look at extended private information retrieval protocols. (English) Zbl 1246.94023

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 305-322 (2009).
MSC:  94A60 68M12 68P20
PDFBibTeX XMLCite
Full Text: DOI

Traitors collaborating in public: Pirates 2.0. (English) Zbl 1239.94071

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 189-205 (2009).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of HB\(^{\#}\) against a man-in-the-middle attack. (English) Zbl 1206.94084

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 108-124 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient traitor tracing from collusion secure codes. (English) Zbl 1162.94340

Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 171-182 (2008).
MSC:  94A60 94B35
PDFBibTeX XMLCite
Full Text: DOI

Fully collusion resistant traitor tracing with short ciphertexts and private keys. (English) Zbl 1140.94326

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 573-592 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software