Distance-Bounding, Privacy-Preserving Attribute-Based Credentials (Englisch)
- Neue Suche nach: Bosk, Daniel
- Neue Suche nach: Bouget, Simon
- Neue Suche nach: Buchegger, Sonja
- Neue Suche nach: Bosk, Daniel
- Neue Suche nach: Bouget, Simon
- Neue Suche nach: Buchegger, Sonja
In:
Cryptology and network security
; 147-166
;
2020
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Distance-Bounding, Privacy-Preserving Attribute-Based Credentials
-
Beteiligte:
-
Kongress:CANS ; 19. ; 2020 ; Online
-
Erschienen in:Cryptology and network security ; 147-166
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2020
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
An Attack on Some Signature Schemes Constructed from Five-Pass Identification SchemesKales, Daniel / Zaverucha, Greg et al. | 2020
- 23
-
Energy Analysis of Lightweight AEAD CircuitsCaforio, Andrea / Balli, Fatih / Banik, Subhadeep et al. | 2020
- 43
-
Cross-Site Search Attacks: Unauthorized Queries over Private DataMeyuhas, Bar / Gelernter, Nethanel / Herzberg, Amir et al. | 2020
- 65
-
Stronger Targeted Poisoning Attacks Against Malware DetectionNarisada, Shintaro / Sasaki, Shoichiro / Hidano, Seira / Uchibayashi, Toshihiro / Suganuma, Takuo / Hiji, Masahiro / Kiyomoto, Shinsaku et al. | 2020
- 85
-
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android EnvironmentsKumar, Saurabh / Mishra, Debadatta / Panda, Biswabandan / Shukla, Sandeep K. et al. | 2020
- 107
-
HMAC and “Secure Preferences”: Revisiting Chromium-Based Browsers SecurityPicazo-Sanchez, Pablo / Schneider, Gerardo / Sabelfeld, Andrei et al. | 2020
- 127
-
Detecting Word Based DGA Domains Using Ensemble ModelsCharan, P. V. Sai / Shukla, Sandeep K. / Anand, P. Mohan et al. | 2020
- 147
-
Distance-Bounding, Privacy-Preserving Attribute-Based CredentialsBosk, Daniel / Bouget, Simon / Buchegger, Sonja et al. | 2020
- 167
-
Trenchcoat: Human-Computable Hashing Algorithms for Password GenerationRooparaghunath, Ruthu Hulikal / Harikrishnan, T. S. / Gupta, Debayan et al. | 2020
- 188
-
Provably Secure Scalable Distributed Authentication for CloudsHuszti, Andrea / Oláh, Norbert et al. | 2020
- 211
-
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUICDallmeier, Fynn / Drees, Jan P. / Gellert, Kai / Handirk, Tobias / Jager, Tibor / Klauke, Jonas / Nachtigall, Simon / Renzelmann, Timo / Wolf, Rudi et al. | 2020
- 235
-
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OTGuilhem, Cyprien Delpech de Saint / Orsini, Emmanuela / Petit, Christophe / Smart, Nigel P. et al. | 2020
- 259
-
Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof CompositionHousni, Youssef El / Guillevic, Aurore et al. | 2020
- 280
-
Curves with Fast Computations in the First Pairing GroupClarisse, Rémi / Duquesne, Sylvain / Sanders, Olivier et al. | 2020
- 299
-
Revisiting ECM on GPUsWloka, Jonas / Richter-Brockmann, Jan / Stahlke, Colin / Kleinjung, Thorsten / Priplata, Christine / Güneysu, Tim et al. | 2020
- 323
-
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset BlockchainsLuzio, Adriano Di / Francati, Danilo / Ateniese, Giuseppe et al. | 2020
- 344
-
Detecting Covert Cryptomining Using HPCGangwal, Ankit / Piazzetta, Samuele Giuliano / Lain, Gianluca / Conti, Mauro et al. | 2020
- 365
-
Lightweight Virtual Payment ChannelsJourenko, Maxim / Larangeira, Mario / Tanaka, Keisuke et al. | 2020
- 387
-
Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHEPal, Tapas / Dutta, Ratna et al. | 2020
- 409
-
Linear Complexity Private Set Intersection for Secure Two-Party ProtocolsKarakoç, Ferhat / Küpçü, Alptekin et al. | 2020
- 430
-
Compact Multi-Party Confidential TransactionsAlupotha, Jayamine / Boyen, Xavier / Foo, Ernest et al. | 2020
- 453
-
Simulation Extractable Versions of Groth's zk-SNARK RevisitedBaghery, Karim / Pindado, Zaira / Ràfols, Carla et al. | 2020
- 462
-
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle ModelDavid, Bernardo / Dowsley, Rafael et al. | 2020
- 485
-
Integral Cryptanalysis of Reduced-Round Tweakable TWINEElSheikh, Muhammad / Youssef, Amr M. et al. | 2020
- 505
-
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit CompilationMantel, Heiko / Scheidel, Lukas / Schneider, Thomas / Weber, Alexandra / Weinert, Christian / Weißmantel, Tim et al. | 2020
- 526
-
Assembly or Optimized C for Lightweight Cryptography on RISC-V?Campos, Fabio / Jellema, Lars / Lemmen, Mauk / Müller, Lars / Sprenkels, Daan / Viguier, Benoit et al. | 2020
- 549
-
Attack on LAC Key Exchange in Misuse SituationGreuet, Aurélien / Montoya, Simon / Renault, Guénaël et al. | 2020
- 570
-
Enhancing Code Based Zero-Knowledge Proofs Using Rank MetricBellini, Emanuele / Gaborit, Philippe / Hasikos, Alexandros / Mateu, Victor et al. | 2020
- 593
-
A Secure Algorithm for Rounded Gaussian SamplingBrannigan, Séamus / O'Neill, Maire / Khalid, Ayesha / Rafferty, Ciara et al. | 2020
- 613
-
Accelerating Lattice Based Proxy Re-encryption Schemes on GPUsSahu, Gyana / Rohloff, Kurt et al. | 2020