Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme (Englisch)
- Neue Suche nach: Singh, K.
- Neue Suche nach: Rangan, C.P.
- Neue Suche nach: Banerjee, A.K.
- Neue Suche nach: Singh, K.
- Neue Suche nach: Rangan, C.P.
- Neue Suche nach: Banerjee, A.K.
- Neue Suche nach: Chakraborty, Rajat Subhra
- Neue Suche nach: Matyas, Vashek
- Neue Suche nach: Schaumont, Patrick R.
In:
Security, privacy, and applied cryptography engineering 4th international conference, SPACE 2014
8804
;
76-91
;
2014
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
-
Beteiligte:Singh, K. ( Autor:in ) / Rangan, C.P. ( Autor:in ) / Banerjee, A.K. ( Autor:in ) / Chakraborty, Rajat Subhra / Matyas, Vashek / Schaumont, Patrick R.
-
Kongress:International conference; 4th, Security, privacy, and applied cryptography engineering 4th international conference, SPACE 2014 ; 2014 ; Pune, India
-
Erschienen in:Security, privacy, and applied cryptography engineering 4th international conference, SPACE 2014 , 8804 ; 76-91LECTURE NOTES IN COMPUTER SCIENCE , 8804 ; 76-91
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:16 pages
-
Anmerkungen:Also known as SPACE 2014. Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Lightweight and Secure PUFs: A Survey (Invited Paper)Nguyen, P.H. / Sahoo, D.P. et al. | 2014
- 14
-
Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?Chakraborty, A. / Mazumdar, B. / Mukhopadhyay, D. et al. | 2014
- 28
-
Implementing Cryptographic Pairings at Standard Security LevelsEnge, A. / Milan, J. et al. | 2014
- 47
-
An Efficient Robust Secret Sharing Scheme with Optimal Cheater ResiliencyRoy, P.S. / Adhikari, A. / Xu, R. / Morozov, K. / Sakurai, K. et al. | 2014
- 59
-
CASH: Cellular Automata Based Parameterized HashKuila, S. / Saha, D. / Pal, M. / Chowdhury, D.R. et al. | 2014
- 76
-
Lattice Based Identity Based Unidirectional Proxy Re-Encryption SchemeSingh, K. / Rangan, C.P. / Banerjee, A.K. et al. | 2014
- 92
-
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper)Ostadal, R. / Svenda, P. / Matyas, V. et al. | 2014
- 110
-
Differential Power Analysis Attack on SIMON and LED Block CiphersShanmugam, D. / Selvam, R. / Annadurai, S. et al. | 2014
- 126
-
Khudra: A New Lightweight Block Cipher for FPGAsKolay, S. / Mukhopadhyay, D. et al. | 2014
- 146
-
FNR: Arbitrary Length Small Domain Block Cipher ProposalDara, S. / Fluhrer, S. et al. | 2014
- 155
-
AEC: A Practical Scheme for Authentication with Error CorrectionSengupta, A. / Saha, D. / Ghosh, S. / Mehta, D. / Chowdhury, D.R. et al. | 2014
- 171
-
Yet Another Strong Privacy-Preserving RFID Mutual Authentication ProtocolSonghela, R. / Das, M.L. et al. | 2014
- 183
-
Boosting Higher-Order Correlation Attacks by Dimensionality ReductionBruneau, N. / Danger, J.-L. / Guilley, S. / Heuser, A. / Teglia, Y. et al. | 2014
- 201
-
Analysis and Improvements of the DPA Contest v4 ImplementationBhasin, S. / Bruneau, N. / Danger, J.-L. / Guilley, S. / Najm, Z. et al. | 2014
- 219
-
Some Randomness Experiments on TRIVIUMSamajder, S. / Sarkar, P. et al. | 2014
- 237
-
Randomized Batch Verification of Standard ECDSA SignaturesKarati, S. / Das, A. / Roychoudhury, D. et al. | 2014
- 256
-
Batch Verification of EdDSA SignaturesKarati, S. / Das, A. et al. | 2014
- 272
-
Faster Randomness Testing with the NIST Statistical Test SuiteSys, M. / Riha, Z. et al. | 2014
- 285
-
t-Private Systems: Unified Private Memories and ComputationPark, J. / Tyagi, A. et al. | 2014
- 303
-
Android Malware Analysis Using Ensemble FeaturesAswini, A.M. / Vinod, P. et al. | 2014
- 319
-
Linux Malware Detection Using eXtended-Symmetric UncertaintyAsmitha, K.A. / Vinod, P. et al. | 2014