Zhang, Jiang; Chen, Yu; Zhang, Zhenfeng Lattice-based programmable hash functions and applications. (English) Zbl 07793132 J. Cryptology 37, No. 1, Paper No. 4, 57 p. (2024). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J. Zhang} et al., J. Cryptology 37, No. 1, Paper No. 4, 57 p. (2024; Zbl 07793132) Full Text: DOI
Jain, Aayush; Lin, Huijia; Sahai, Amit Indistinguishability obfuscation. (English) Zbl 07821711 Beliaev, Dmitry (ed.) et al., International congress of mathematicians 2022, ICM 2022, Helsinki, Finland, virtual, July 6–14, 2022. Volume 6. Sections 12–14. Berlin: European Mathematical Society (EMS). 4762-4798 (2023). MSC: 94A60 68Q17 68Q17 68N20 11H99 11T71 PDFBibTeX XMLCite \textit{A. Jain} et al., in: International congress of mathematicians 2022, ICM 2022, Helsinki, Finland, virtual, July 6--14, 2022. Volume 6. Sections 12--14. Berlin: European Mathematical Society (EMS). 4762--4798 (2023; Zbl 07821711) Full Text: DOI OA License
Jain, Aayush; Lin, Huijia; Luo, Ji On the optimal succinctness and efficiency of functional encryption and attribute-based encryption. (English) Zbl 1528.94060 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 479-510 (2023). MSC: 94A60 68P15 68P20 PDFBibTeX XMLCite \textit{A. Jain} et al., Lect. Notes Comput. Sci. 14006, 479--510 (2023; Zbl 1528.94060) Full Text: DOI
Taguchi, Ren; Takayasu, Atsushi Concrete quantum cryptanalysis of binary elliptic curves via addition chain. (English) Zbl 07745601 Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 57-83 (2023). MSC: 81P94 94A60 40E15 91B32 82B20 14H52 14A21 81P65 68Q06 PDFBibTeX XMLCite \textit{R. Taguchi} and \textit{A. Takayasu}, Lect. Notes Comput. Sci. 13871, 57--83 (2023; Zbl 07745601) Full Text: DOI
Jang, Kyungbae; Baksi, Anubhab; Kim, Hyunji; Seo, Hwajeong; Chattopadhyay, Anupam Improved quantum analysis of SPECK and LowMC. (English) Zbl 07726579 Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 517-540 (2023). MSC: 81P68 94A60 68W35 68P10 81P70 68Q06 PDFBibTeX XMLCite \textit{K. Jang} et al., Lect. Notes Comput. Sci. 13774, 517--540 (2023; Zbl 07726579) Full Text: DOI
Kirshanova, Elena; May, Alexander Breaking Goppa-based McEliece with hints. (English) Zbl 07713417 Inf. Comput. 293, Article ID 105045, 14 p. (2023). MSC: 68Qxx PDFBibTeX XMLCite \textit{E. Kirshanova} and \textit{A. May}, Inf. Comput. 293, Article ID 105045, 14 p. (2023; Zbl 07713417) Full Text: DOI
Saha, Amit; Chattopadhyay, Anupam; Chakrabarti, Amlan Robust quantum arithmetic operations with intermediate qutrits in the NISQ-era. (English) Zbl 1528.81095 Int. J. Theor. Phys. 62, No. 4, Paper No. 92, 15 p. (2023). MSC: 81P68 65Y04 81P65 81P73 94A50 68Q09 PDFBibTeX XMLCite \textit{A. Saha} et al., Int. J. Theor. Phys. 62, No. 4, Paper No. 92, 15 p. (2023; Zbl 1528.81095) Full Text: DOI arXiv
Nitaj, Abderrahmane; Susilo, Willy; Tonien, Joseph A new attack on some RSA variants. (English) Zbl 07687174 Theor. Comput. Sci. 960, Article ID 113898, 9 p. (2023). MSC: 68Qxx PDFBibTeX XMLCite \textit{A. Nitaj} et al., Theor. Comput. Sci. 960, Article ID 113898, 9 p. (2023; Zbl 07687174) Full Text: DOI
Venema, Marloes; Alpár, Greg; Hoepman, Jaap-Henk Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice. (English) Zbl 1506.94070 Des. Codes Cryptography 91, No. 1, 165-220 (2023). MSC: 94A60 68P27 68M25 PDFBibTeX XMLCite \textit{M. Venema} et al., Des. Codes Cryptography 91, No. 1, 165--220 (2023; Zbl 1506.94070) Full Text: DOI
Li, Ni; Chen, Zhenhua; Nie, Jingjing; Fu, Xingbing; Jia, Xingxing Complementary set encryption for privacy-preserving data consolidation. (English) Zbl 07800156 Inf. Sci. 593, 271-288 (2022). MSC: 68P25 68P27 94A60 PDFBibTeX XMLCite \textit{N. Li} et al., Inf. Sci. 593, 271--288 (2022; Zbl 07800156) Full Text: DOI
Aranha, Diego F.; Engelmann, Felix; Kolby, Sebastian; Yakoubov, Sophia The state of the union: union-only signatures for data aggregation. (English) Zbl 1518.94104 Galdi, Clemente (ed.) et al., Security and cryptography for networks. 13th International conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13409, 387-410 (2022). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{D. F. Aranha} et al., Lect. Notes Comput. Sci. 13409, 387--410 (2022; Zbl 1518.94104) Full Text: DOI
Lee, Jongheon; Lee, Sokjoon; Lee, You-Seok; Choi, Dooho \(T\)-depth reduction method for efficient SHA-256 quantum circuit construction. (English) Zbl 07628060 Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 379-402 (2022). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{J. Lee} et al., Lect. Notes Comput. Sci. 13218, 379--402 (2022; Zbl 07628060) Full Text: DOI
Nassr, Dieaa I.; Anwar, M.; Bahig, Hatem M. Improving small private exponent attack on the Murru-Saettone cryptosystem. (English) Zbl 07540240 Theor. Comput. Sci. 923, 222-234 (2022). MSC: 68Qxx PDFBibTeX XMLCite \textit{D. I. Nassr} et al., Theor. Comput. Sci. 923, 222--234 (2022; Zbl 07540240) Full Text: DOI
Xu, Jun; Sarkar, Santanu; Hu, Lei Revisiting orthogonal lattice attacks on approximate common divisor problems. (English) Zbl 07496386 Theor. Comput. Sci. 911, 55-69 (2022). MSC: 68Qxx PDFBibTeX XMLCite \textit{J. Xu} et al., Theor. Comput. Sci. 911, 55--69 (2022; Zbl 07496386) Full Text: DOI
Nandi, Mridul; Pandit, Tapas Efficient fully CCA-secure predicate encryptions from pair encodings. (English) Zbl 1481.94118 Adv. Math. Commun. 16, No. 1, 37-72 (2022). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Nandi} and \textit{T. Pandit}, Adv. Math. Commun. 16, No. 1, 37--72 (2022; Zbl 1481.94118) Full Text: DOI
Zhao, Liang; Wang, Xingfeng; Huang, Xinyi Verifiable single-server private information retrieval from LWE with binary errors. (English) Zbl 1475.68117 Inf. Sci. 546, 897-923 (2021). MSC: 68P20 68P25 68P27 PDFBibTeX XMLCite \textit{L. Zhao} et al., Inf. Sci. 546, 897--923 (2021; Zbl 1475.68117) Full Text: DOI
Sergioli, Giuseppe A matrix representation of quantum circuits over non-adjacent qudits. (English) Zbl 1523.81047 Int. J. Theor. Phys. 60, No. 2, 515-533 (2021). MSC: 81P68 68Q06 81P10 81P65 PDFBibTeX XMLCite \textit{G. Sergioli}, Int. J. Theor. Phys. 60, No. 2, 515--533 (2021; Zbl 1523.81047) Full Text: DOI arXiv
Tomida, Junichi; Kawahara, Yuto; Nishimaki, Ryo Fast, compact, and expressive attribute-based encryption. (English) Zbl 1475.94171 Des. Codes Cryptography 89, No. 11, 2577-2626 (2021). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Tomida} et al., Des. Codes Cryptography 89, No. 11, 2577--2626 (2021; Zbl 1475.94171) Full Text: DOI
Takahashi, Yasuhiro; Tani, Seiichiro Power of uninitialized qubits in shallow quantum circuits. (English) Zbl 1480.81031 Theor. Comput. Sci. 851, 129-153 (2021). MSC: 81P68 68Q06 PDFBibTeX XMLCite \textit{Y. Takahashi} and \textit{S. Tani}, Theor. Comput. Sci. 851, 129--153 (2021; Zbl 1480.81031) Full Text: DOI Link
Pal, Tapas; Dutta, Ratna Chosen-ciphertext secure multi-identity and multi-attribute pure FHE. (English) Zbl 1519.68031 Krenn, Stephan (ed.) et al., Cryptology and network security. 19th international conference, CANS 2020, Vienna, Austria, December 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12579, 387-408 (2020). MSC: 68M25 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{T. Pal} and \textit{R. Dutta}, Lect. Notes Comput. Sci. 12579, 387--408 (2020; Zbl 1519.68031) Full Text: DOI
Anand, Ravi; Maitra, Arpita; Mukhopadhyay, Sourav Evaluation of quantum cryptanalysis on SPECK. (English) Zbl 1500.81021 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 395-413 (2020). MSC: 81P94 94A60 81P68 68Q06 68P10 PDFBibTeX XMLCite \textit{R. Anand} et al., Lect. Notes Comput. Sci. 12578, 395--413 (2020; Zbl 1500.81021) Full Text: DOI
Mumtaz, Majid; Ping, Luo Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices. (English) Zbl 1474.94070 Inf. Sci. 538, 54-68 (2020). MSC: 94A60 68M11 PDFBibTeX XMLCite \textit{M. Mumtaz} and \textit{L. Ping}, Inf. Sci. 538, 54--68 (2020; Zbl 1474.94070) Full Text: DOI
Şahin, Engin Quantum arithmetic operations based on quantum Fourier transform on signed integers. (English) Zbl 1457.81028 Int. J. Quantum Inf. 18, No. 6, Article ID 2050035, 21 p. (2020). MSC: 81P68 68Q12 65Y04 PDFBibTeX XMLCite \textit{E. Şahin}, Int. J. Quantum Inf. 18, No. 6, Article ID 2050035, 21 p. (2020; Zbl 1457.81028) Full Text: DOI arXiv
Semenov, Alexander; Otpuschennikov, Ilya; Gribanova, Irina; Zaikin, Oleg; Kochemazov, Stepan Translation of algorithmic descriptions of discrete functions to SAT with applications to cryptanalysis problems. (English) Zbl 1528.94079 Log. Methods Comput. Sci. 16, No. 1, Paper No. 29, 42 p. (2020). MSC: 94A60 68T20 PDFBibTeX XMLCite \textit{A. Semenov} et al., Log. Methods Comput. Sci. 16, No. 1, Paper No. 29, 42 p. (2020; Zbl 1528.94079) Full Text: arXiv Link
Takahashi, Yasuhiro; Tani, Seiichiro Power of uninitialized qubits in shallow quantum circuits. (English) Zbl 1487.81052 Niedermeier, Rolf (ed.) et al., 35th symposium on theoretical aspects of computer science, STACS 2018, Caen, France, February 28 – March 3, 2018. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 96, Article 57, 13 p. (2018). MSC: 81P68 68Q06 PDFBibTeX XMLCite \textit{Y. Takahashi} and \textit{S. Tani}, LIPIcs -- Leibniz Int. Proc. Inform. 96, Article 57, 13 p. (2018; Zbl 1487.81052) Full Text: DOI arXiv
Aono, Yoshinori; Agrawal, Manindra; Satoh, Takakazu; Watanabe, Osamu On the optimality of lattices for the Coppersmith technique. (English) Zbl 1401.94136 Appl. Algebra Eng. Commun. Comput. 29, No. 2, 169-195 (2018). MSC: 94A60 11T71 68Q25 68W40 PDFBibTeX XMLCite \textit{Y. Aono} et al., Appl. Algebra Eng. Commun. Comput. 29, No. 2, 169--195 (2018; Zbl 1401.94136) Full Text: DOI Link
He, Kai; Liu, Xueqiao; Yuan, Huaqiang; Wei, Wenhong; Liang, Kaitai Hierarchical conditional proxy re-encryption: a new insight of fine-grained secure data sharing. (English) Zbl 1503.68059 Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 118-135 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. He} et al., Lect. Notes Comput. Sci. 10701, 118--135 (2017; Zbl 1503.68059) Full Text: DOI
He, Kai; Weng, Jian; Deng, Robert H.; Liu, Joseph K. On the security of two identity-based conditional proxy re-encryption schemes. (English) Zbl 1371.94641 Theor. Comput. Sci. 652, 18-27 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. He} et al., Theor. Comput. Sci. 652, 18--27 (2016; Zbl 1371.94641) Full Text: DOI
Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota Attribute-based encryption for range attributes. (English) Zbl 1400.94114 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 42-61 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. Attrapadung} et al., Lect. Notes Comput. Sci. 9841, 42--61 (2016; Zbl 1400.94114) Full Text: DOI
Singh, Kunwar; Rangan, C. Pandu; Banerjee, A. K. Lattice-based identity-based resplittable threshold public key encryption scheme. (English) Zbl 1376.94045 Int. J. Comput. Math. 93, No. 2, 289-307 (2016). MSC: 94A60 94A62 68W20 PDFBibTeX XMLCite \textit{K. Singh} et al., Int. J. Comput. Math. 93, No. 2, 289--307 (2016; Zbl 1376.94045) Full Text: DOI
Thomsen, Michael Kirkedal; Kaarsgaard, Robin; Soeken, Mathias Ricercar: a language for describing and rewriting reversible circuits with ancillae and its permutation semantics. (English) Zbl 1464.68109 Krivine, Jean (ed.) et al., Reversible computation. 7th international conference, RC 2015, Grenoble, France, July 16–17, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9138, 200-215 (2015). MSC: 68Q06 68Q09 68Q42 68Q55 PDFBibTeX XMLCite \textit{M. K. Thomsen} et al., Lect. Notes Comput. Sci. 9138, 200--215 (2015; Zbl 1464.68109) Full Text: DOI
Yang, Kang; Xu, Jing; Zhang, Zhenfeng Certificateless proxy re-encryption without pairings. (English) Zbl 1445.68085 Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, South Korea, November 27–29, 2013. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8565, 67-88 (2014). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. Yang} et al., Lect. Notes Comput. Sci. 8565, 67--88 (2014; Zbl 1445.68085) Full Text: DOI
Zhang, Jiang; Zhang, Zhenfeng; Chen, Yu PRE: stronger security notions and efficient construction with non-interactive opening. (English) Zbl 1360.68450 Theor. Comput. Sci. 542, 1-16 (2014). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Zhang} et al., Theor. Comput. Sci. 542, 1--16 (2014; Zbl 1360.68450) Full Text: DOI
Attrapadung, Nuttapong; Herranz, Javier; Laguillaumie, Fabien; Libert, Benoît; de Panafieu, Elie; Ràfols, Carla Attribute-based encryption schemes with constant-size ciphertexts. (English) Zbl 1259.94043 Theor. Comput. Sci. 422, 15-38 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. Attrapadung} et al., Theor. Comput. Sci. 422, 15--38 (2012; Zbl 1259.94043) Full Text: DOI
Saeedi, Mehdi; Wille, Robert; Drechsler, Rolf Synthesis of quantum circuits for linear nearest neighbor architectures. (English) Zbl 1216.81052 Quantum Inf. Process. 10, No. 3, 355-377 (2011). MSC: 81P68 68M07 68Q12 PDFBibTeX XMLCite \textit{M. Saeedi} et al., Quantum Inf. Process. 10, No. 3, 355--377 (2011; Zbl 1216.81052) Full Text: DOI arXiv
May, Alexander Using LLL-reduction for solving RSA and factorization problems. (English) Zbl 1237.94078 Nguyen, Phong Q. (ed.) et al., The LLL algorithm. Survey and applications. Dordrecht: Springer (ISBN 978-3-642-02294-4/hbk; 978-3-642-02295-1/ebook). Information Security and Cryptography, 315-348 (2010). MSC: 94A60 68Q25 11Y16 PDFBibTeX XMLCite \textit{A. May}, in: The LLL algorithm. Survey and applications. Dordrecht: Springer. 315--348 (2010; Zbl 1237.94078) Full Text: DOI
Leurent, Gaëtan MD4 is not one-way. (English) Zbl 1154.68400 Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 412-428 (2008). MSC: 68P25 68N99 94A60 PDFBibTeX XMLCite \textit{G. Leurent}, Lect. Notes Comput. Sci. 5086, 412--428 (2008; Zbl 1154.68400) Full Text: DOI
Kunihiro, Noboru; Yamashita, Shigeru Efficient algorithms for NMR quantum computers with small qubits. (English) Zbl 1101.81317 New Generation Comput. 21, No. 4, 329-337 (2003). MSC: 81P68 68W10 11Y05 11Y16 PDFBibTeX XMLCite \textit{N. Kunihiro} and \textit{S. Yamashita}, New Generation Comput. 21, No. 4, 329--337 (2003; Zbl 1101.81317) Full Text: DOI
Rivest, R. L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. (English) Zbl 0368.94005 Commun. ACM 21, 120-126 (1978). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{R. L. Rivest} et al., Commun. ACM 21, 120--126 (1978; Zbl 0368.94005) Full Text: DOI Link Backlinks: MO