A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory (Englisch)
- Neue Suche nach: Mathew, K.P.
- Neue Suche nach: Vasant, S.
- Neue Suche nach: Rangan, C.P.
- Neue Suche nach: Mathew, K.P.
- Neue Suche nach: Vasant, S.
- Neue Suche nach: Rangan, C.P.
- Neue Suche nach: Lee, Hyang-Sook
- Neue Suche nach: Han, Dong-Guk
In:
Information security and cryptology
8565
;
342-362
;
2014
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
-
Beteiligte:Mathew, K.P. ( Autor:in ) / Vasant, S. ( Autor:in ) / Rangan, C.P. ( Autor:in ) / Lee, Hyang-Sook / Han, Dong-Guk
-
Kongress:International conference; 16th, Information security and cryptology ; 2013 ; Seoul
-
Erschienen in:Information security and cryptology , 8565 ; 342-362LECTURE NOTES IN COMPUTER SCIENCE , 8565 ; 342-362
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:21 pages
-
Anmerkungen:Based on those presented at the conference. Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Privacy Assurances in Multiple Data-Aggregation TransactionsLe, K. / Ramanathan, P. / Saluja, K.K. et al. | 2014
- 20
-
A Secure Priority Queue; Or: On Secure Datastructures from Multiparty ComputationToft, T. et al. | 2014
- 34
-
Towards Secure Two-Party Computation from the Wire-Tap ChannelChabanne, H. / Cohen, G. / Patey, A. et al. | 2014
- 49
-
Combined Proxy Re-encryptionCanard, S. / Devigne, J. et al. | 2014
- 67
-
Certificateless Proxy Re-Encryption Without PairingsYang, K. / Xu, J. / Zhang, Z. et al. | 2014
- 91
-
Enabling 3-Share Threshold Implementations for all 4-Bit S-BoxesKutzner, S. / Nguyen, P.H. / Poschmann, A. et al. | 2014
- 109
-
Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis AttacksKim, Y. / Ko, H. et al. | 2014
- 123
-
Impossible Differential Attack on Reduced-Round TWINEZheng, X. / Jia, K. et al. | 2014
- 144
-
Optimal Storage for Rainbow TablesAvoine, G. / Carpent, X. et al. | 2014
- 158
-
First Multidimensional Cryptanalysis on Reduced-Round PRINCE~c~o~r~eLi, X. / Li, B. / Wu, W. / Yu, X. / Hao, R. / Ma, B. et al. | 2014
- 175
-
Rebound Attacks on StribogAlTawy, R. / Kircanski, A. / Youssef, A.M. et al. | 2014
- 189
-
Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX DesignsSasaki, Y. / Wang, L. et al. | 2014
- 203
-
General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block CipherLin, L. / Wu, W. / Wang, Y. / Zhang, L. et al. | 2014
- 227
-
Integral Based Fault Attack on LBlockChen, H. / Fan, L. et al. | 2014
- 241
-
Protecting Ring Oscillator Physical Unclonable Functions Against Modeling AttacksMansouri, S.S. / Dubrova, E. et al. | 2014
- 256
-
Parallel Implementations of LEASeo, H. / Liu, Z. / Park, T. / Kim, H. / Lee, Y. / Choi, J. et al. | 2014
- 277
-
Invertible Polynomial Representation for Private Set OperationsCheon, J.H. / Hong, H. / Lee, H.T. et al. | 2014
- 293
-
On the Efficacy of Solving LWE by Reduction to Unique-SVPAlbrecht, M.R. / Fitzpatrick, R. / Gopfert, F. et al. | 2014
- 311
-
A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit FunctionWang, Q. / Tan, C.H. / Foo, T. et al. | 2014
- 325
-
Ambiguous One-Move Nominative Signature Without Random OraclesLiu, D.Y.W. / Wong, D.S. / Huang, Q. et al. | 2014
- 342
-
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryMathew, K.P. / Vasant, S. / Rangan, C.P. et al. | 2014
- 363
-
An Anonymous Reputation System with Reputation Secrecy for ManagerNakanishi, T. / Nomura, T. / Funabiki, N. et al. | 2014
- 381
-
Database Outsourcing with Hierarchical Authenticated Data StructuresEtemad, M. / Kupcu, A. et al. | 2014
- 400
-
Information-Theoretically Secure Entity Authentication in the Multi-user SettingHajime, S. / Watanabe, Y. / Shikata, J. et al. | 2014
- 418
-
Practical Receipt-Free Sealed-Bid Auction in the Coercive EnvironmentHowlader, J. / Roy, S.K. / Mal, A.K. et al. | 2014
- 435
-
Revocable Group Signatures with Compact Revocation List Using AccumulatorsNakanishi, T. / Funabiki, N. et al. | 2014
- 455
-
Semantic Feature Selection for Text with Application to Phishing Email DetectionVerma, R. / Hossain, N. et al. | 2014
- 469
-
Who Is Sending a Spam Email: Clustering and Characterizing Spamming HostsWoo, J. / Kang, H.J. / Kang, A.R. / Kwon, H. / Kim, H.K. et al. | 2014
- 483
-
Dark Side of the Shader: Mobile GPU-Aided Malware DeliveryDanisevskis, J. / Piekarska, M. / Seifert, J.-P. et al. | 2014
- 496
-
Industry-Wide Misunderstandings of HTTPSBono, S. / Thompson, J. et al. | 2014
- 517
-
Efficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelMathew, K.P. / Vasant, S. / Rangan, C.P. et al. | 2014