×

Found 1,676 Documents (Results 1–100)

100
MathJax

Witness authenticating NIZKs and applications. (English) Zbl 07529193

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 3-33 (2021).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Quantum indistinguishability for public key encryption. (English) Zbl 07495927

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 463-482 (2021).
MSC:  94A60 81P94 68P25
PDF BibTeX XML Cite
Full Text: DOI

Memory optimization techniques for computing discrete logarithms in compressed SIKE. (English) Zbl 07495919

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 296-315 (2021).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Improving Thomae-Wolf algorithm for solving underdetermined multivariate quadratic polynomial problem. (English) Zbl 07495907

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 65-78 (2021).
PDF BibTeX XML Cite
Full Text: DOI

Security comparisons and performance analyses of post-quantum signature algorithms. (English) Zbl 07493518

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12727, 424-447 (2021).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI

History of integer factorisation. (English) Zbl 1483.94058

Bos, Joppe W. (ed.) et al., Computational cryptography. Algorithmic aspects of cryptology. A tribute to Arjen K. Lenstra on the occasion of his 65th birthday. Cambridge: Cambridge University Press. Lond. Math. Soc. Lect. Note Ser. 469, 41-77 (2021).
PDF BibTeX XML Cite
Full Text: Link

Cryptographic pseudorandom generators can make cryptosystems problematic. (English) Zbl 07450214

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12711, 441-468 (2021).
MSC:  68P25 68M14 94A60
PDF BibTeX XML Cite
Full Text: DOI

On the CCA compatibility of public-key infrastructure. (English) Zbl 1479.94200

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12711, 235-260 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Revisiting (R)CCA security and replay protection. (English) Zbl 1479.94119

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12711, 173-202 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On selective-opening security of deterministic primitives. (English) Zbl 1479.94239

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12711, 147-172 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Subversion-resilient public key encryption with practical watchdogs. (English) Zbl 1479.94127

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 627-658 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Universal proxy re-encryption. (English) Zbl 07450191

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 512-542 (2021).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Multivariate public key cryptosystem from Sidon spaces. (English) Zbl 1479.94246

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 242-265 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI arXiv

Classical vs quantum random oracles. (English) Zbl 1479.94349

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 568-597 (2021).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Analysing the HPKE standard. (English) Zbl 1479.94109

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 87-116 (2021).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

On the memory-tightness of hashed ElGamal. (English) Zbl 07496545

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 33-62 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark). (English) Zbl 1479.94237

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12550, 179-209 (2020).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

CP-ABE for circuits (and More) in the symmetric key setting. (English) Zbl 1479.94106

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12550, 117-148 (2020).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security. (English) Zbl 1479.94202

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 703-728 (2020).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Optimal broadcast encryption from pairings and LWE. (English) Zbl 1479.94105

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 13-43 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

New assumptions and efficient cryptosystems from the \(e\)-th power residue symbol. (English) Zbl 1466.94041

Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 408-424 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient forward-secure threshold public key encryption. (English) Zbl 1467.94038

Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 330-349 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of the multivariate encryption scheme EFLASH. (English) Zbl 1457.94170

Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12006, 85-105 (2020).
MSC:  94A60 13P10
PDF BibTeX XML Cite
Full Text: DOI

Designing a public key cryptosystem based on quasi-cyclic subspace subcodes of Reed-Solomon codes. (English) Zbl 1442.81021

Gueye, Cheikh Thiecoumba (ed.) et al., Algebra, codes and cryptology. Proceedings of the first international conference, A2C 2019, in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019. Cham: Springer. Commun. Comput. Inf. Sci. 1133, 97-113 (2019).
MSC:  81P94 81P70 81P45
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis on CCA2-secured LRPC-Kronecker cryptosystem. (English) Zbl 1457.94156

Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 211-228 (2019).
MSC:  94A60 94A29
PDF BibTeX XML Cite
Full Text: DOI

Middle-product learning with rounding problem and its applications. (English) Zbl 1456.94043

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11921, 55-81 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI HAL

Symmetric primitives with structured secrets. (English) Zbl 1456.94041

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11692, 650-679 (2019).
MSC:  94A60 94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

PKP-based signature scheme. (English) Zbl 1456.94049

Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 3-22 (2019).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

The local forking lemma and its application to deterministic encryption. (English) Zbl 1456.94047

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 607-636 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Public-key function-private hidden vector encryption (and more). (English) Zbl 1456.94045

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 489-519 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

The Mersenne Low Hamming Combination Search problem can be reduced to an ILP problem. (English) Zbl 1454.94055

Buchmann, Johannes (ed.) et al., Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11627, 41-55 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Dual isogenies and their application to public-key compression for isogeny-based cryptography. (English) Zbl 07196563

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11922, 243-272 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Optimal bounded-collusion secure functional encryption. (English) Zbl 1455.94110

Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 174-198 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Quantum security proofs using semi-classical oracles. (English) Zbl 07178454

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 269-295 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Classification

Biographic Reference

all top 3

Software