Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Tatiana Bradley, Sky Faber, Gene Tsudik |
Bounded Size-Hiding Private Set Intersection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 449-467, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yuyu Wang 0001, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka |
Signatures Resilient to Uninvertible Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 372-390, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christof Beierle |
Pen and Paper Arguments for SIMON and SIMON-like Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 431-446, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou |
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 587-603, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig |
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 391-408, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Oriol Farràs, Naty Peter |
Secret Sharing Schemes for Dense Forbidden Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 509-528, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ran Cohen, Chris Peikert |
On Adaptively Secure Multiparty Computation with a Short CRS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 129-146, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Baum |
On Garbling Schemes with and Without Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 468-485, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi |
Provably-Secure Remote Memory Attestation for Heap Overflow Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 83-103, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yi Deng 0002, Juan A. Garay, San Ling, Huaxiong Wang, Moti Yung |
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 237-253, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Arno Mittelbach, Daniele Venturi 0001 |
Fiat-Shamir for Highly Sound Protocols Is Instantiable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 198-215, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Or Dagmi |
Shorter Circuit Obfuscation in Challenging Security Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 551-570, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rafaël del Pino, Vadim Lyubashevsky, David Pointcheval |
The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 273-291, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Eiichiro Fujisaki |
Improving Practical UC-Secure Commitments Based on the DDH Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 257-272, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart |
Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 147-168, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chris Peikert |
How (Not) to Instantiate Ring-LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 411-430, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au |
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 3-22, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Biagioni, Daniel Masny, Daniele Venturi 0001 |
Naor-Yung Paradigm with Shared Randomness and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 62-80, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Brett Hemenway, Steve Lu 0001, Rafail Ostrovsky, William Welser IV |
High-Precision Secure Computation of Satellite Collision Probabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 169-187, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Robert R. Enderlein, Ueli Maurer |
Memory Erasability Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 104-125, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Trotta Gnam |
Zero-Knowledge Made Easy so It Won't Make You Dizzy - (A Tale of Transaction Put in Verse About an Illicit Kind of Commerce). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 191-197, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shlomi Dolev, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung |
Proactive Secret Sharing with a Dishonest Majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 529-548, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jie Chen 0021, Benoît Libert, Somindu C. Ramanna |
Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 23-41, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Carmit Hazay, Muthuramakrishnan Venkitasubramaniam |
What Security Can We Achieve Within 4 Rounds? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 486-505, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Leonid Reyzin, Sophia Yakoubov |
Efficient Asynchronous Accumulators for Distributed PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 292-309, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Marcedone, Rafael Pass, Abhi Shelat |
Bounded KDM Security from iO and OWF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 571-586, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada 0001 |
Attribute-Based Encryption for Range Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 42-61, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Dario Catalano, Mario Di Raimondo, Simone Faro |
Verifiable Pattern Matching on Outsourced Texts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 333-350, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin |
Virtual Smart Cards: How to Sign with a Password and a Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 353-371, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Carmit Hazay, Hila Zarosim |
The Feasibility of Outsourced Database Search in the Plain Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings, pp. 313-332, 2016, Springer, 978-3-319-44617-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vassilis Zikas, Roberto De Prisco (eds.) |
Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![Springer, 978-3-319-44617-2 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rafail Ostrovsky, Vanishree Rao, Ivan Visconti |
On Selective-Opening Attacks against Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 578-597, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nikolaos Makriyannis |
On the Classification of Finite Boolean Functions up to Fairness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 135-154, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Marcedone, Claudio Orlandi |
Obfuscation ⇒ (IND-CPA Security !⇒ Circular Security). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 77-90, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001, Kazuo Ohta |
Improved Indifferentiable Security Analysis of PHOTON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 340-357, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Lampkins, Rafail Ostrovsky |
Communication-Efficient MPC for General Adversary Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 155-174, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Katsuyuki Takashima |
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 298-317, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Jain 0002, Omkant Pandey |
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 435-454, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Yamakawa, Shota Yamada 0001, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro |
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 558-577, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jason Perry, Debayan Gupta, Joan Feigenbaum, Rebecca N. Wright |
Systematizing Secure Computation for Research and Decision Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 380-397, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Dario Fiore 0001 |
Interactive Encryption and Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 494-513, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dario Catalano |
Homomorphic Signatures and Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 514-519, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa |
Efficient NIZK Arguments via Parallel Verification of Benes Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 416-434, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Georg Fuchsbauer |
Constrained Verifiable Random Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 95-114, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov |
Key-Indistinguishable Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 476-493, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Pointcheval, Olivier Sanders |
Forward Secure Non-Interactive Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 21-39, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniel V. Bailey, Markus Dürmuth, Christof Paar |
Statistics on Password Re-use and Adaptive Strength for Financial Accounts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 218-235, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Baum, Ivan Damgård, Claudio Orlandi |
Publicly Auditable Secure Multi-Party Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 175-196, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Lei Wang 0031 |
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 324-339, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen |
Faster Maliciously Secure Two-Party Computation Using the GPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 358-379, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Roberto De Prisco (eds.) |
Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![Springer, 978-3-319-10878-0 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis |
Secure Key Exchange and Sessions without Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 40-56, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sanjam Garg |
Program Obfuscation via Multilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 91-94, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Naccache, Rainer Steinwandt, Adriana Suárez Corona, Moti Yung |
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 598-607, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0003, Zongyang Zhang |
Publicly Evaluable Pseudorandom Functions and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 115-134, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Choudhury, Arpita Patra, Nigel P. Smart |
Reducing the Overhead of MPC over a Large Population. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 197-217, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Paul Giura, Vladimir Kolesnikov, Aris Tentes, Yevgeniy Vahlis |
Efficient Network-Based Enforcement of Data Access Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 236-254, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jie Chen 0021, Hoeteck Wee |
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 277-297, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Eduarda S. V. Freire 0001, Julia Hesse, Dennis Hofheinz |
Universally Composable Non-Interactive Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 1-20, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andrea G. Forte, Juan A. Garay, Trevor Jim, Yevgeniy Vahlis |
EyeDecrypt - Private Interactions in Plain Sight. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 255-276, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi |
Proofs of Space: When Space Is of the Essence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 538-557, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hoeteck Wee |
Functional Encryption and Its Impact on Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 318-323, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omkant Pandey, Kim Ramchen, Brent Waters |
Relaxed Two-to-One Recoding Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 57-76, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nikolaos P. Karvelas, Aggelos Kiayias |
Efficient Proofs of Secure Erasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 520-537, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Rasmus Lauritsen, Tomas Toft |
An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 398-415, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Muthuramakrishnan Venkitasubramaniam |
On Adaptively Secure Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings, pp. 455-475, 2014, Springer, 978-3-319-10878-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gottfried Herold, Alexander Meurer |
New Attacks for Knapsack Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 326-342, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Björn Terelius, Douglas Wikström |
Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 461-476, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven |
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 559-579, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guilhem Castagnos, Fabien Laguillaumie |
Homomorphic Encryption for Multiplications and Pairing Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 374-392, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Steven A. Myers, Mona Sergi, Abhi Shelat |
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 149-165, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Céline Blondeau, Benoît Gérard, Kaisa Nyberg |
Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 343-360, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Adriana López-Alt |
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 38-56, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Dana Dachman-Soled, Moti Yung |
On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 264-280, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Anja Lehmann, Dominique Schröder |
History-Free Sequential Aggregate Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 113-130, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Arno Mittelbach |
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 522-539, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler |
5PM: Secure Pattern Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 222-240, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila |
Publicly Verifiable Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 393-410, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiang Xie, Rui Xue 0001, Rui Zhang 0002 |
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 1-18, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Melissa Chase, Markulf Kohlweiss |
A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 131-148, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ching-Hua Yu, Bo-Yin Yang |
Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 426-444, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Thomae |
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 361-373, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Kolesnikov, Ranjit Kumaresan |
Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 205-221, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart |
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 241-263, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Stelios Erotokritou, Yvo Desmedt |
Human Perfectly Secure Message Transmission Protocols and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 540-558, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Duong Hieu Phan, David Pointcheval, Mario Strefler |
Decentralized Dynamic Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 166-183, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld |
Active Security in Multiparty Computation over Black-Box Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 503-521, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu |
On the Strength Comparison of the ECDLP and the IFP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 302-325, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kohei Kasamatsu, Takahiro Matsuda 0002, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai |
Time-Specific Encryption from Forward-Secure Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 184-204, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa, Bingsheng Zhang |
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 477-502, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Visconti, Roberto De Prisco (eds.) |
Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![Springer, 978-3-642-32927-2 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Gregory Neven, Markus Rückert |
Fully Anonymous Attribute Tokens from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 57-75, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Blazy, David Pointcheval, Damien Vergnaud |
Compact Round-Optimal Partially-Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 95-112, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Yasunaga |
Public-Key Encryption with Lazy Parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 411-425, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Kolesnikov |
MAC Aggregation with Message Multiplicity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 445-460, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev |
Efficient Structure-Preserving Signature Scheme from Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 76-94, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Margarita Vald |
Universally Composable Security with Local Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 281-301, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart |
Ring Switching in BGV-Style Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, pp. 19-37, 2012, Springer, 978-3-642-32927-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
Solving Revocation with Efficient Update of Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings, pp. 454-471, 2010, Springer, 978-3-642-15316-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Adam L. Young, Moti Yung |
Kleptography from Standard Assumptions and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings, pp. 271-290, 2010, Springer, 978-3-642-15316-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|