×

Found 26 Documents (Results 1–26)

Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers. (English) Zbl 07799272

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 694-726 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The query-complexity of preprocessing attacks. (English) Zbl 07799231

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 482-513 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Snowblind: a threshold blind signature in pairing-free groups. (English) Zbl 07799111

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 710-742 (2023).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Revisiting BBS signatures. (English) Zbl 1528.94103

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 691-721 (2023).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Threshold and multi-signature schemes from linear hash functions. (English) Zbl 1528.94102

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 628-658 (2023).
MSC:  94A62 94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Hiding in plain sight: memory-tight proofs via randomness programming. (English) Zbl 1497.94092

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13276, 706-735 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Tight security for key-alternating ciphers with correlated sub-keys. (English) Zbl 1514.94132

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 435-464 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Better security-efficiency trade-offs in permutation-based two-party computation. (English) Zbl 07684784

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13091, 275-304 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

The \(t\)-wise independence of substitution-permutation networks. (English) Zbl 1489.94104

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 454-483 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Tight state-restoration soundness in the algebraic group model. (English) Zbl 1487.94116

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 64-93 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Password hashing and preprocessing. (English) Zbl 1479.94317

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 64-91 (2021).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

The memory-tightness of authenticated encryption. (English) Zbl 1503.94049

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 127-156 (2020).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries. (English) Zbl 1443.94080

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 3-32 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds. (English) Zbl 1423.94055

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 468-499 (2018).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Scrypt is maximally memory-hard. (English) Zbl 1394.94925

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-56616-0/pbk; 978-3-319-56617-7/ebook). Lecture Notes in Computer Science 10212, 33-62 (2017).
MSC:  94A60 68Q10
PDFBibTeX XMLCite
Full Text: DOI

Public-seed pseudorandom permutations. (English) Zbl 1415.94461

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10211, 412-441 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The multi-user security of double encryption. (English) Zbl 1415.94438

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10211, 381-411 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simultaneous secrecy and reliability amplification for a general channel model. (English) Zbl 1406.94066

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 235-261 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key-alternating ciphers and key-length extension: exact bounds and multi-user security. (English) Zbl 1351.94051

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 3-32 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Contention in cryptoland: obfuscation, leakage and UCE. (English) Zbl 1382.94062

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 542-564 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Two-round man-in-the-middle security from LPN. (English) Zbl 1378.94074

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 225-248 (2016).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC. (English) Zbl 1375.94127

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 368-387 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A hardcore lemma for computational indistinguishability: security amplification for arbitrarily weak PRGs with optimal stretch. (English) Zbl 1274.94098

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 237-254 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Abstract storage devices. (English) Zbl 1206.68109

Nielsen, Mogens (ed.) et al., SOFSEM 2009: Theory and practice of computer science. 35th conference on current trends in theory and practice of computer science, Špindlerův Mlýn, Czech Republic, January 24–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-540-95890-1/pbk). Lecture Notes in Computer Science 5404, 341-352 (2009).
MSC:  68P20
PDFBibTeX XMLCite
Full Text: DOI arXiv Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software