5PM: Secure Pattern Matching (Englisch)
- Neue Suche nach: Baron, Joshua
- Neue Suche nach: Defrawy, Karim
- Neue Suche nach: Minkovich, Kirill
- Neue Suche nach: Ostrovsky, Rafail
- Neue Suche nach: Tressler, Eric
- Neue Suche nach: Baron, Joshua
- Neue Suche nach: Defrawy, Karim
- Neue Suche nach: Minkovich, Kirill
- Neue Suche nach: Ostrovsky, Rafail
- Neue Suche nach: Tressler, Eric
In:
Security and Cryptography for Networks
4
;
222-240
;
2012
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:5PM: Secure Pattern Matching
-
Beteiligte:Baron, Joshua ( Autor:in ) / Defrawy, Karim ( Autor:in ) / Minkovich, Kirill ( Autor:in ) / Ostrovsky, Rafail ( Autor:in ) / Tressler, Eric ( Autor:in )
-
Erschienen in:Security and Cryptography for Networks , 4 ; 222-240Lecture Notes in Computer Science ; 7485, 4 ; 222-240
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2012
-
Format / Umfang:19 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input SettingXie, Xiang / Xue, Rui / Zhang, Rui et al. | 2012
- 19
-
Ring Switching in BGV-Style Homomorphic EncryptionGentry, Craig / Halevi, Shai / Peikert, Chris / Smart, Nigel P. et al. | 2012
- 38
-
Zero-Knowledge Proofs with Low Amortized Communication from Lattice AssumptionsDamgård, Ivan / López-Alt, Adriana et al. | 2012
- 57
-
Fully Anonymous Attribute Tokens from LatticesCamenisch, Jan / Neven, Gregory / Rückert, Markus et al. | 2012
- 76
-
Efficient Structure-Preserving Signature Scheme from Standard AssumptionsCamenisch, Jan / Dubovitskaya, Maria / Haralambiev, Kristiyan et al. | 2012
- 95
-
Compact Round-Optimal Partially-Blind SignaturesBlazy, Olivier / Pointcheval, David / Vergnaud, Damien et al. | 2012
- 113
-
History-Free Sequential Aggregate SignaturesFischlin, Marc / Lehmann, Anja / Schröder, Dominique et al. | 2012
- 131
-
A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLINChase, Melissa / Kohlweiss, Markulf et al. | 2012
- 149
-
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext AwarenessMyers, Steven / Sergi, Mona / shelat, abhi et al. | 2012
- 166
-
Decentralized Dynamic Broadcast EncryptionPhan, Duong Hieu / Pointcheval, David / Strefler, Mario et al. | 2012
- 184
-
Time-Specific Encryption from Forward-Secure EncryptionKasamatsu, Kohei / Matsuda, Takahiro / Emura, Keita / Attrapadung, Nuttapong / Hanaoka, Goichiro / Imai, Hideki et al. | 2012
- 205
-
Improved Secure Two-Party Computation via Information-Theoretic Garbled CircuitsKolesnikov, Vladimir / Kumaresan, Ranjit et al. | 2012
- 222
-
5PM: Secure Pattern MatchingBaron, Joshua / Defrawy, Karim / Minkovich, Kirill / Ostrovsky, Rafail / Tressler, Eric et al. | 2012
- 241
-
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC ProtocolDamgård, Ivan / Keller, Marcel / Larraia, Enrique / Miles, Christian / Smart, Nigel P. et al. | 2012
- 264
-
On the Centrality of Off-Line E-Cash to Concrete Partial Information GamesChoi, Seung Geol / Dachman-Soled, Dana / Yung, Moti et al. | 2012
- 281
-
Universally Composable Security with Local AdversariesCanetti, Ran / Vald, Margarita et al. | 2012
- 17
-
On the Strength Comparison of the ECDLP and the IFPYasuda, Masaya / Shimoyama, Takeshi / Kogure, Jun / Izu, Tetsuya et al. | 2012
- 326
-
New Attacks for Knapsack Based CryptosystemsHerold, Gottfried / Meurer, Alexander et al. | 2012
- 343
-
Multiple Differential Cryptanalysis Using LLR and χ 2 StatisticsBlondeau, Céline / Gérard, Benoît / Nyberg, Kaisa et al. | 2012
- 361
-
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative RingsThomae, Enrico et al. | 2012
- 374
-
Homomorphic Encryption for Multiplications and Pairing EvaluationCastagnos, Guilhem / Laguillaumie, Fabien et al. | 2012
- 393
-
Publicly Verifiable CiphertextsGonzález Nieto, Juan Manuel / Manulis, Mark / Poettering, Bertram / Rangasamy, Jothi / Stebila, Douglas et al. | 2012
- 411
-
Public-Key Encryption with Lazy PartiesYasunaga, Kenji et al. | 2012
- 426
-
Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and ExponentiationYu, Ching-Hua / Yang, Bo-Yin et al. | 2012
- 445
-
MAC Aggregation with Message MultiplicityKolesnikov, Vladimir et al. | 2012
- 461
-
Efficiency Limitations of Σ-Protocols for Group Homomorphisms RevisitedTerelius, Björn / Wikström, Douglas et al. | 2012
- 477
-
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle ArgumentLipmaa, Helger / Zhang, Bingsheng et al. | 2012
- 503
-
Active Security in Multiparty Computation over Black-Box GroupsDesmedt, Yvo / Pieprzyk, Josef / Steinfeld, Ron et al. | 2012
- 522
-
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long OutputMittelbach, Arno et al. | 2012
- 540
-
Human Perfectly Secure Message Transmission Protocols and Their ApplicationsErotokritou, Stelios / Desmedt, Yvo et al. | 2012
- 559
-
Oblivious Transfer with Hidden Access Control from Attribute-Based EncryptionCamenisch, Jan / Dubovitskaya, Maria / Enderlein, Robert R. / Neven, Gregory et al. | 2012