×

Found 252 Documents (Results 1–100)

Classification of Hadamard products of one-codimensional subcodes of Reed-Muller codes. (English. Russian original) Zbl 1512.94124

Discrete Math. Appl. 32, No. 5, 297-311 (2022); translation from Diskretn. Mat. 32, No. 1, 115-134 (2020).
MSC:  94B05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multivariate encryption schemes based on polynomial equations over real numbers. (English) Zbl 1501.94060

Ding, Jinta (ed.) et al., Post-quantum cryptography. 11th international conference, PQCrypto 2020, Paris, France, April 15–17, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12100, 402-421 (2020).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Key bit-dependent attack on protected PKC using a single trace. (English) Zbl 1506.94068

Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 168-185 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Semantic security and key-privacy with random split of St-Gen codes. (English) Zbl 1479.94320

Beckmann, Arnold (ed.) et al., Pursuit of the universal. 12th conference on computability in Europe, CiE 2016, Paris, France, June 27 – July 1, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9709, 105-114 (2016).
MSC:  94A62 94A60 94B25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the multivariate signature scheme proposed in PQCrypto 2013. (English) Zbl 1355.94061

Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 108-125 (2014).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the Quaternion Rainbow. (English) Zbl 1344.94051

Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41382-7/pbk). Lecture Notes in Computer Science 8231, 244-257 (2013).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Extended algorithm for solving underdefined multivariate quadratic equations. (English) Zbl 1306.94076

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 118-135 (2013).
MSC:  94A60 81P94 11T71
PDFBibTeX XMLCite
Full Text: DOI

Factor-4 and 6 (de)compression for values of pairings using trace maps. (English) Zbl 1291.94171

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 19-34 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptography: from history to applications. Summer school of CIMPA-UNESCO on cryptography, Oujda, Maroc, May 18–30, 2009. (Cryptographie: de l’histoire aux applications. Ecole d’été de CIMPA-UNESCO de cryptographie, Oujda, Maroc, Mai 18–30, 2009.) (English, French, Arabic) Zbl 1398.94006

Travaux en Cours 80. Paris: Hermann (ISBN 978-2-7056-8118-0). 388 p. (2012).
PDFBibTeX XMLCite

Crypto applications of combinatorial group theory. (English) Zbl 1366.94502

Crnković, Dean (ed.) et al., Information security, coding theory and related combinatorics. Information coding and combinatorics. Based on lectures presented at the NATO Advanced Study Institute, Opatija, Croatia, May 31 – June 11, 2010. Amsterdam: IOS Press (ISBN 978-1-60750-662-1/hbk; 978-1-60750-663-8/ebook). NATO Science for Peace and Security Series D: Information and Communication Security 29, 1-16 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

High-speed hardware implementation of Rainbow signature on FPGAs. (English) Zbl 1298.94107

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 228-243 (2011).
MSC:  94A60 81P94 11T71
PDFBibTeX XMLCite
Full Text: DOI

Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. (English) Zbl 1290.94094

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 19-34 (2011).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

General fault attacks on multivariate public key cryptosystems. (English) Zbl 1290.94084

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 1-18 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Braid group cryptography. (English) Zbl 1203.94100

Berrick, A. Jon (ed.) et al., Braids. Introductory lectures on braids, configurations and their applications. Based on the program “Braids”, IMS, Singapore, May 14–July 13, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-4291-40-8/hbk). Lecture Notes Series. Institute for Mathematical Sciences. National University of Singapore 19, 329-403 (2010).
PDFBibTeX XMLCite
Full Text: arXiv

Protecting sensitive information in directory services using virtual directories. (English) Zbl 1184.68232

Bertino, Elisa (ed.) et al., Collaborative computing: networking, applications and worksharing. 4th international ICST conference, CollaborateCom 2008, Orlando, FL, USA, November 13–16, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03353-7/pbk; 978-3-642-03354-4/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 10, 244-257 (2009).
MSC:  68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptology. An introduction to the science of encoding, concealing and hiding. 8th ed. (Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen. Ohne alle Geheimniskrämerei, aber nicht ohne hinterlistigen Schalk, dargestellt zum Nutzen und Ergötzen des allgemeinen Publikums.) (German) Zbl 1152.94001

Wiesbaden: Vieweg (ISBN 978-3-8348-0253-8/pbk). xii, 155 p. (2007).
PDFBibTeX XMLCite

A weakness in some oblivious transfer and zero-knowledge protocols. (English) Zbl 1172.94592

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 348-363 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

MaTRU: A new NTRU-based cryptosystem. (English) Zbl 1153.94362

Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 232-243 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Homomorphic cryptosystems based on subgroup membership problems. (English) Zbl 1126.94328

Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 314-327 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast multi-computations with integer similarity strategy. (English) Zbl 1081.94544

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 138-153 (2005).
MSC:  94A60 68M07
PDFBibTeX XMLCite
Full Text: DOI

Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. (English) Zbl 1092.94505

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 352-369 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Theoretical informatics. Computability, complexity theory, algorithmics, cryptography. An introduction. 2nd, revised and extended ed. (Theoretische Informatik. Berechenbarkeit, Komplexitätstheorie, Algorithmik, Kryptographie. Eine Einführung.) (German) Zbl 1069.68046

Leitfäden der Informatik. Stuttgart: Teubner (ISBN 3-519-10332-X/pbk). 335 p. (2004).
PDFBibTeX XMLCite

Efficient revocation and threshold pairing based cryptosystems. (English) Zbl 1321.94078

Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC ’03, Boston, MA, USA, July 13–16, 2003. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-708-7). 163-171 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

The impact of decryption failures on the security of NTRU encryption. (English) Zbl 1122.94377

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 226-246 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

About the XL algorithm over GF(2). (English) Zbl 1039.94511

Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 141-157 (2003).
PDFBibTeX XMLCite
Full Text: Link

An alternate decomposition of an integer for faster point multiplication on certain elliptic curves. (English) Zbl 1055.94527

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 323-334 (2002).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

DPA countermeasures by improving the window method. (English) Zbl 1020.94521

Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 303-317 (2002).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks. (English) Zbl 1020.94527

Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 98-113 (2002).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

Linear recursive sequences over elliptic curves. (English) Zbl 1035.94532

Helleseth, Tor (ed.) et al., Sequences and their applications. Proceedings of the 2nd international conference (SETA’01), Bergen, Norway, May 13–17, 2001. London: Springer (ISBN 1-85233-529-7). Discrete Mathematics and Theoretical Computer Science, 182-196 (2002).
PDFBibTeX XMLCite

Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. (English) Zbl 1033.94547

Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 71-84 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptology. An introduction to the science of encoding, concealing and hiding. 6., überarb. Aufl. (Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen.) (German) Zbl 1005.94001

Wiesbaden: Vieweg. viii, 179 S. (2002).
PDFBibTeX XMLCite

Robust non-interactive zero knowledge. (English) Zbl 1003.94526

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 566-598 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

New public key cryptosystem using finite non abelian groups. (English) Zbl 1003.94525

Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 470-485 (2001).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation). (English) Zbl 1024.68527

Honary, Bahram (ed.), Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17-19, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2260, 114-127 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Error-correcting codes and cryptography. (English) Zbl 0989.94027

Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 209-219 (2001).
Reviewer: K.Roegner (Berlin)
MSC:  94A60 94B05
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software