Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong |
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Dziembowski |
How to Pair with a Human. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stanislaw Jarecki, Nitesh Saxena |
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elena Andreeva 0001, Bart Mennink, Bart Preneel |
On the Indifferentiability of the Grøstl Hash Function. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III |
Public-Key Encryption with Efficient Amortized Updates. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Atsuko Miyaji |
Generalized RC4 Key Collisions and Hash Collisions. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chris Peikert |
Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk). |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Martin Gagné, Shivaramakrishnan Narayan, Reihaneh Safavi-Naini |
Threshold Attribute-Based Signcryption. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stanislaw Jarecki, Xiaomin Liu |
Fast Secure Computation of Set Intersection. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Kolesnikov |
A Security Enhancement and Proof for Authentication and Key Agreement (AKA). |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Jian Weng 0001 |
Generic Constructions of Parallel Key-Insulated Encryption. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata |
Provably Secure Convertible Undeniable Signatures with Unambiguity. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Davì, Stefan Dziembowski, Daniele Venturi 0001 |
Leakage-Resilient Storage. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel P. Smart, Bogdan Warinschi |
Get Shorty via Group Signatures without Encryption. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi |
The Fiat-Shamir Transform for Group and Ring Signature Schemes. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bartosz Przydatek, Douglas Wikström |
Group Message Authentication. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Dominique Schröder, Peter Schröder, Daniel Wagner |
History-Free Aggregate Message Authentication Codes. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard |
A New Security Model for Authenticated Key Agreement. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter H. Hartel, Willem Jonker |
Searching Keywords with Wildcards on Encrypted Data. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jianyong Huang, Willy Susilo, Jennifer Seberry |
Differential Fault Analysis of LEX. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Markus Rückert |
Adaptively Secure Identity-Based Identification from Lattices without Random Oracles. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Feng-Hao Liu, Anna Lysyanskaya |
Algorithmic Tamper-Proof Security under Probing Attacks. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth G. Paterson, Elizabeth A. Quaglia |
Time-Specific Encryption. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aniket Kate, Ian Goldberg |
Distributed Private-Key Generators for Identity-Based Cryptography. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Plantard, Willy Susilo |
Recursive Lattice Reduction. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Juan A. Garay, Roberto De Prisco (eds.) |
Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Octavian Catrina, Sebastiaan de Hoogh |
Improved Primitives for Secure Multiparty Integer Computation. |
SCN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bodo Möller, Andy Rupp |
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
embedded cryptography, elliptic curve cryptography, exponentiation, Efficient implementation, DSA, ECDSA |
1 | Isamu Teranishi, Wakaha Ogata |
Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Statistical Plaintext Awareness, Cramer-Shoup Scheme, Standard Model |
1 | Xavier Boyen, Cécile Delerablée |
Expressive Subgroup Signatures. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Malika Izabachène, David Pointcheval |
New Anonymity Notions for Identity-Based Encryption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Information Theoretic Security, Error Probability |
1 | Amos Beimel, Anat Paskin |
On Linear Secret Sharing for Connectivity in Directed Graphs. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sherman S. M. Chow, Volker Roth 0002, Eleanor Gilbert Rieffel |
General Certificateless Encryption and Timed-Release Encryption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Security-mediated certificateless encryption, standard model, timed-release encryption |
1 | Douglas Wikström |
Simplified Submission of Inputs to Protocols. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Christian Schridde, Matthew Smith 0001, Bernd Freisleben |
An Identity-Based Key Agreement Protocol for the Network Layer. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Jianying Zhou 0001 |
Efficient Certificate-Based Encryption in the Standard Model. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Georg Fuchsbauer, David Pointcheval |
Anonymous Proxy Signatures. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth G. Paterson, Gaven J. Watson |
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi |
Storage Encryption: A Cryptographer's View. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Julien Bringer, Hervé Chabanne, Thomas Icart |
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Tree-Based Hash Protocol, POK, Privacy, RFID tags, PUF |
1 | Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti (eds.) |
Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings |
SCN |
2008 |
DBLP BibTeX RDF |
|
1 | Jun Furukawa 0001, Frederik Armknecht, Kaoru Kurosawa |
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
session ID generation, universal composability, Group key exchange |
1 | Ali Bagherzandi, Stanislaw Jarecki |
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Guilhem Castagnos |
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Homomorphic Scheme, Paillier Cryptosystem, Quadratic Fields, IND-CPA and IND-CCA2 security, Standard Model, Generic Construction, Probabilistic Encryption |
1 | Christophe Petit 0001, Kristin E. Lauter, Jean-Jacques Quisquater |
Full Cryptanalysis of LPS and Morgenstern Hash Functions. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Bhavana Kanukurthi, Leonid Reyzin |
An Improved Robust Fuzzy Extractor. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron |
A New DPA Countermeasure Based on Permutation Tables. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Chevallier-Mames, David Naccache, Jacques Stern |
Linear Bandwidth Naccache-Stern Encryption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
ns cryptosystem, multiplicative knapsack, efficiency, Public key cryptography |
1 | Svetla Nikova, Vincent Rijmen, Martin Schläffer |
Using Normal Bases for Compact Hardware Implementations of the AES S-Box. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
AES, hardware implementation, S-box, normal basis |
1 | Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou 0001 |
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell, Benny Pinkas, Nigel P. Smart |
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marco Baldi, Marco Bodrato, Franco Chiaraluce |
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
QC-LDPC codes, Toom-Cook, Winograd, Cryptanalysis, McEliece cryptosystem |
1 | Yves Igor Jerschow, Christian Lochert, Björn Scheuermann 0001, Martin Mauve |
CLL: A Cryptographic Link Layer for Local Area Networks. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Shouhuai Xu, Moti Yung |
Privacy Preserving Data Mining within Anonymous Credential Systems. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Matthew K. Franklin |
Edge Eavesdropping Games. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
graph search games, unconditional security, passive adversary, mobile adversary |
1 | Alejandro Hevia |
Universally Composable Simultaneous Broadcast. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Billet, Henri Gilbert |
Cryptanalysis of Rainbow. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
UOV (Unblanced Oil and Vinegar), Public Key Cryptography, Signature Schemes, Multivariate Cryptography, Rainbow |
1 | Roberto De Prisco, Alfredo De Santis |
Cheating Immune (2, n)-Threshold Visual Secret Sharing. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Kunz-Jacques, David Pointcheval |
About the Security of MTI/C0 and MQV. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jaume Martí-Farré, Carles Padró |
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
Ideal access structures, Secret sharing representable matroids, Secret sharing, Ideal secret sharing schemes, Information rate |
1 | S. Dov Gordon, Jonathan Katz |
Rational Secret Sharing, Revisited. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Walid Bagga, Stefano Crosta, Refik Molva |
Proof-Carrying Proxy Certificates. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
Data Minimization, Authorization, Bilinear Pairings, Credentials, Proxy Certificates |
1 | Ivan Damgård |
Theory and Practice of Multiparty Computation. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Joan Daemen, Vincent Rijmen |
Understanding Two-Round Differentials in AES. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Fida El Haje, Yuri Golubev, Pierre-Yvan Liardet, Yannick Teglia |
On Statistical Testing of Random Numbers Generators. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Éric Levieil, Pierre-Alain Fouque |
An Improved LPN Algorithm. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater |
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Swee-Huay Heng |
Relations Among Security Notions for Undeniable Signature Schemes. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature |
1 | Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya |
Balancing Accountability and Privacy Using E-Cash (Extended Abstract). |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Roberto De Prisco, Moti Yung (eds.) |
Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Daniel V. Bailey, Ari Juels |
Shoehorning Security into the EPC Tag Standard. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
authentication, RFID, cloning, EPC, counterfeiting, PIN |
1 | Amir Herzberg, Igal Yoffe |
On Secure Orders in the Presence of Faults. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Hong-Sheng Zhou |
Concurrent Blind Signatures Without Random Oracles. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest |
Lightweight Email Signatures (Extended Abstract). |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Joan Daemen, Gilles Van Assche |
Distinguishing Stream Ciphers with Convolutional Filters. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David Galindo, Eike Kiltz |
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jiqiang Lu, Changhoon Lee, Jongsung Kim |
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
Cobra-F64a, Cobra-F64b, Block cipher, Differential cryptanalysis, Related-key attacks, Data-dependent permutation |
1 | Sébastien Kunz-Jacques, David Pointcheval |
A New Key Exchange Protocol Based on MQV Assuming Public Computations. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Constant-Size Dynamic k-TAA. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Blundo, Stelvio Cimato (eds.) |
Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers |
SCN |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel |
ECRYPT: The Cryptographic Research Challenges for the Next Decade. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Breno de Medeiros |
On the Key Exposure Problem in Chameleon Hashes. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Maciej Koprowski, Bogdan Warinschi |
Efficient Blind Signatures Without Random Oracles. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg |
Controlling Spam by Secure Internet Content Selection. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin |
Identity-Based Zero Knowledge. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Nigel P. Smart |
Efficient Key Encapsulation to Multiple Parties. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Van-Ly Le, Werner Schindler |
How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
short cycles, systems of algebraic equations, low-cost group identification, Nonlinear feedback shift register, invariant theory |
1 | Douglas Wikström |
Universally Composable DKG with Linear Number of Exponentiations. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Miodrag J. Mihaljevic, Hideki Imai |
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
overdefined systems of equations, hypotheses testing, cryptanalysis, stream ciphers, algebraic attacks, decimation |
1 | Claude Crépeau, Kirill Morozov, Stefan Wolf 0001 |
Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Stelvio Cimato, Roberto De Prisco, Alfredo De Santis |
Colored Visual Cryptography Without Color Darkening. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Jens Groth |
Group Signatures: Better Efficiency and New Theoretical Aspects. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland |
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Fabien Laguillaumie, Damien Vergnaud |
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
Privacy of signers identity, Bilinear Diffie-Hellman problems, Exact security, Designated verifier signatures, Tight reduction |
1 | Christopher Wolf, An Braeken, Bart Preneel |
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jun Furukawa 0001, Shoko Yonezawa |
Group Signatures with Separate and Distributed Authorities. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Adam L. Young, Moti Yung |
Relationships Between Diffie-Hellman and "Index Oracles". |
SCN |
2004 |
DBLP DOI BibTeX RDF |
Diffie-Hellman (DH), Computational Diffie-Hellman, Decision Diffie-Hellman, JDL, LDL, Public Key Cryptography, Oracles, Black-Box Reductions, Discrete-Log |