Cryptanalysis of the Quaternion Rainbow (Englisch)
- Neue Suche nach: Hashimoto, Y.
- Neue Suche nach: Hashimoto, Y.
- Neue Suche nach: Sakiyama, Kazuo
- Neue Suche nach: Terada, Masayuki
In:
International workshop on security; Advances in information and computer security
8231
;
244-257
;
2013
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Cryptanalysis of the Quaternion Rainbow
-
Beteiligte:
-
Kongress:8th, International workshop on security; Advances in information and computer security ; 2013 ; Okinawa, Japan
-
Erschienen in:LECTURE NOTES IN COMPUTER SCIENCE , 8231 ; 244-257
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:14 pages
-
Anmerkungen:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Secure Log Transfer by Replacing a Library in a Virtual MachineSato, M. / Yamauchi, T. et al. | 2013
- 19
-
Static Integer Overflow Vulnerability Detection in Windows BinaryDeng, Y. / Zhang, Y. / Cheng, L. / Sun, X. et al. | 2013
- 36
-
Solving Google's Continuous Audio CAPTCHA with HMM-Based Automatic Speech RecognitionSano, S. / Otsuka, T. / Okuno, H.G. et al. | 2013
- 53
-
Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability SpacesMoreira, J. / Fernandez, M. / Kabatiansky, G. et al. | 2013
- 68
-
Differential Power Analysis of MAC-Keccak at Any Key-LengthTaha, M. / Schaumont, P. et al. | 2013
- 83
-
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMACNaito, Y. / Sasaki, Y. / Wang, L. / Yasuda, K. et al. | 2013
- 99
-
New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFATodo, Y. / Sasaki, Y. et al. | 2013
- 115
-
Improvement of Faugere et al.'s Method to Solve ECDLPHuang, Y.-J. / Petit, C. / Shinohara, N. / Takagi, T. et al. | 2013
- 133
-
Statistics on Encrypted Cloud DataTseng, F.-K. / Liu, Y.-H. / Chen, R.-J. / Lin, B.-S.P. et al. | 2013
- 151
-
Toward Practical Searchable Symmetric EncryptionOgata, W. / Koiwa, K. / Kanaoka, A. / Matsuo, S. et al. | 2013
- 168
-
Unconditionally Secure Oblivious Transfer from Real Network BehaviorPalmieri, P. / Pereira, O. et al. | 2013
- 183
-
Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic EncryptionHirano, T. / Hattori, M. / Ito, T. / Matsuda, N. et al. | 2013
- 201
-
Efficient Algorithm for Tate Pairing of Composite OrderKiyomura, Y. / Takagi, T. et al. | 2013
- 217
-
How to Factor N~1 and N~2 When p~1 = p~2 mod 2^tKurosawa, K. / Ueda, T. et al. | 2013
- 226
-
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid EncryptionMatsuda, T. / Hanaoka, G. et al. | 2013
- 244
-
Cryptanalysis of the Quaternion RainbowHashimoto, Y. et al. | 2013
- 258
-
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing AdversaryXu, R. / Morozov, K. / Takagi, T. et al. | 2013
- 272
-
One-Round Authenticated Key Exchange without Implementation TrickYoneyama, K. et al. | 2013
- 290
-
Attacks to the Proxy Re-Encryption Schemes from IWSEC2011Isshiki, T. / Nguyen, M.H. / Tanaka, K. et al. | 2013
- 303
-
Game-Theoretic Security for Bit CommitmentHigo, H. / Tanaka, K. / Yasunaga, K. et al. | 2013