Towards Quantum Large-Scale Password Guessing on Real-World Distributions (Englisch)
- Neue Suche nach: Dürmuth, Markus
- Neue Suche nach: Golla, Maximilian
- Neue Suche nach: Markert, Philipp
- Neue Suche nach: May, Alexander
- Neue Suche nach: Schlieper, Lars
- Neue Suche nach: Dürmuth, Markus
- Neue Suche nach: Golla, Maximilian
- Neue Suche nach: Markert, Philipp
- Neue Suche nach: May, Alexander
- Neue Suche nach: Schlieper, Lars
In:
Cryptology and network security
; 412-434
;
2021
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Towards Quantum Large-Scale Password Guessing on Real-World Distributions
-
Beteiligte:Dürmuth, Markus ( Autor:in ) / Golla, Maximilian ( Autor:in ) / Markert, Philipp ( Autor:in ) / May, Alexander ( Autor:in ) / Schlieper, Lars ( Autor:in )
-
Kongress:CANS ; 20. ; 2021 ; Online
-
Erschienen in:Cryptology and network security ; 412-434
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2021
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Cross-Domain Attribute-Based Access Control EncryptionSedaghat, Mahdi / Preneel, Bart et al. | 2021
- 24
-
Grain-128AEADv2: Strengthening the Initialization Against Key ReconstructionHell, Martin / Johansson, Thomas / Maximov, Alexander / Meier, Willi / Yoshida, Hirotaka et al. | 2021
- 42
-
Partition Oracles from Weak Key ForgeriesArmour, Marcel / Cid, Carlos et al. | 2021
- 63
-
Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional EncryptionIbarrondo, Alberto / Chabanne, Hervé / Önen, Melek et al. | 2021
- 72
-
The Matrix Reloaded: Multiplication Strategies in FrodoKEMBos, Joppe W. / Ofner, Maximilian / Renes, Joost / Schneider, Tobias / Vredendaal, Christine van et al. | 2021
- 95
-
BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-ProofsAlkadri, Nabil Alkeilani / Harasser, Patrick / Janson, Christian et al. | 2021
- 116
-
Efficient Threshold-Optimal ECDSAPettit, Michaella et al. | 2021
- 136
-
GMMT: A Revocable Group Merkle Multi-tree Signature SchemeYehia, Mahmoud / AlTawvy, Riham / Gulliver, T. Aaron et al. | 2021
- 158
-
Issuer-Hiding Attribute-Based CredentialsBobolz, Jan / Eidens, Fabian / Krenn, Stephan / Ramacher, Sebastian / Samelin, Kai et al. | 2021
- 179
-
Report and Trace Ring SignaturesFraser, Ashley / Ouaglia, Elizabeth A. et al. | 2021
- 200
-
Selectively Linkable Group Signatures—Stronger Security and Preserved VerifiabilityFraser, Ashley / Garms, Lydia / Lehmann, Anja et al. | 2021
- 225
-
FO-like Combiners and Hybrid Post-Quantum CryptographyHuguenin-Dumittan, Lois / Vaudenay, Serge et al. | 2021
- 245
-
Linear-Time Oblivious Permutations for SPDZLaud, Peeter et al. | 2021
- 253
-
On the Higher-Bit Version of Approximate Inhomogeneous Short Integer Solution ProblemDévéhat, Anaëlle Le / Shizuya, Hiroki / Hasegawa, Shingo et al. | 2021
- 273
-
Practical Continuously Non-malleable Randomness Encoders in the Random Oracle ModelFaonio, Antonio et al. | 2021
- 295
-
Countermeasures Against Backdoor Attacks Towards Malware DetectorsNarisada, Shintaro / Matsumoto, Yuki / Hidano, Seira / Uchibayashi, Toshihiro / Suganuma, Takuo / Hiji, Masahiro / Kiyomoto, Shinsaku et al. | 2021
- 315
-
Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated ServicesFietkau, Julian / Runge, David Pascal / Seifert, Jean-Pierre et al. | 2021
- 334
-
Function-Private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point FunctionsMiranda, Nolan / Yeo, Foo Yee / Sehrawat, Vipin Singh et al. | 2021
- 355
-
How Distance-Bounding Can Detect Internet Traffic HijackingArfaoui, Ghada / Avoine, Gildas / Gimenez, Olivier / Traore, Jacques et al. | 2021
- 372
-
SoK: Secure Memory AllocationNovkovie, Bojan / Golub, Marin et al. | 2021
- 392
-
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial TrainingHasegawa, Kento / Hidano, Seira / Kiyomoto, Shinsaku / Togawa, Nozomu et al. | 2021
- 412
-
Towards Quantum Large-Scale Password Guessing on Real-World DistributionsDürmuth, Markus / Golla, Maximilian / Markert, Philipp / May, Alexander / Schlieper, Lars et al. | 2021
- 435
-
Anonymous Transactions with Revocation and Auditing in Hyperledger FabricBogatov, Dmytro / Caro, Angelo De / Elkhiyaout, Kaoutar / Tackmann, Björn et al. | 2021
- 460
-
Attestation Waves: Platform Trust via Remote Power AnalysisDelgado-Lozano, Ignacio M. / Martínez-Rodríguez, Macarena C. / Bakas, Alexandros / Brumley, Billy Bob / Michalas, Antonis et al. | 2021
- 483
-
How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVotingFinogina, Tamara / Herranz, Javier / Larraia, Enrique et al. | 2021
- 492
-
Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular ZK-SNARKsAbdolmaleki, Behzad / Slamanig, Daniel et al. | 2021
- 513
-
THC: Practical and Cost-Effective Verification of Delegated ComputationRauzy, Pablo / Nehme, Ali et al. | 2021
- 531
-
TIRAMISU: Black-Box Simulation Extractable NIZKs in the Updatable CRS ModelBaghery, Karim / Sedaghat, Mahdi et al. | 2021