Communication Optimal Multi-valued Asynchronous Broadcast Protocol (Englisch)
- Neue Suche nach: Patra, A.
- Neue Suche nach: Rangan, C.P.
- Neue Suche nach: Patra, A.
- Neue Suche nach: Rangan, C.P.
- Neue Suche nach: Abdalla, Michel
- Neue Suche nach: Barreto, Paulo S. L. M.
In:
Progress in cryptology: LATINCRYPT 2010 : First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings
6212
;
162-177
;
2010
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Communication Optimal Multi-valued Asynchronous Broadcast Protocol
-
Beteiligte:
-
Kongress:International conference; 1st, Progress in cryptology: LATINCRYPT 2010 : First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings ; 2010 ; Puebla, Mexico
-
Erschienen in:LECTURE NOTES IN COMPUTER SCIENCE , 6212 ; 162-177
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:16 pages
-
Anmerkungen:Includes bibliographical references and author index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Broadcast Encryption with Multiple Trust AuthoritiesBoklan, K.D. / Dent, A.W. / Seaman, C.A. et al. | 2010
- 20
-
Security of Sequential Multiple EncryptionFujioka, A. / Okamoto, Y. / Saito, T. et al. | 2010
- 40
-
Mediated Traceable Anonymous EncryptionIzabachene, M. / Pointcheval, D. / Vergnaud, D. et al. | 2010
- 61
-
Starfish on StrikeBernstein, D.J. / Birkner, P. / Lange, T. et al. | 2010
- 81
-
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic CurvesFouque, P.-A. / Tibouchi, M. et al. | 2010
- 92
-
Fixed Argument PairingsCostello, C. / Stebila, D. et al. | 2010
- 109
-
New Software Speed Records for Cryptographic PairingsNaehrig, M. / Niederhagen, R. / Schwabe, P. et al. | 2010
- 124
-
Accelerating Lattice Reduction with FPGAsDetrey, J. / Hanrot, G. / Pujol, X. / Stehle, D. et al. | 2010
- 144
-
Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction SetsAranha, D.F. / Lopez, J. / Hankerson, D. et al. | 2010
- 162
-
Communication Optimal Multi-valued Asynchronous Broadcast ProtocolPatra, A. / Rangan, C.P. et al. | 2010
- 178
-
On the Impossibility of Batch Update for Cryptographic AccumulatorsCamacho, P. / Hevia, A. et al. | 2010
- 189
-
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way PermutationsGordon, S.D. / Wee, H. / Xiao, D. / Yerukhimovich, A. et al. | 2010
- 205
-
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256Calik, C. / Turan, M.S. et al. | 2010
- 222
-
Generic Attacks on Misty SchemesNachef, V. / Patarin, J. / Treger, J. et al. | 2010
- 241
-
Cryptanalysis of the Hidden Matrix CryptosystemFaugere, J.-C. / Joux, A. / Perret, L. / Treger, J. et al. | 2010
- 255
-
A Lattice-Based Threshold Ring Signature SchemeCayrel, P.-L. / Lindner, R. / Ruckert, M. / Silva, R. et al. | 2010
- 273
-
Defeating Any Secret Cryptography with SCARE AttacksGuilley, S. / Sauvage, L. / Micolod, J. / Real, D. / Valette, F. et al. | 2010
- 294
-
How Leaky Is an Extractor?Standaert, F.-X. et al. | 2010
- 305
-
Combined Implementation Attack Resistant ExponentiationSchmidt, J.-M. / Tunstall, M. / Avanzi, R. / Kizhvatov, I. / Kasper, T. / Oswald, D. et al. | 2010