Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy (Englisch)
Freier Zugriff
- Neue Suche nach: Mihaljević, Miodrag J.
- Neue Suche nach: Mihaljević, Miodrag J.
In:
Advances in Cryptology - ASIACRYPT 2003
4
;
137-154
;
2003
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy
-
Beteiligte:Mihaljević, Miodrag J. ( Autor:in )
-
Erschienen in:Advances in Cryptology - ASIACRYPT 2003 , 4 ; 137-154Lecture Notes in Computer Science ; 2894, 4 ; 137-154
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2003
-
Format / Umfang:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Chosen-Ciphertext Security without RedundancyPhan, Duong Hieu / Pointcheval, David et al. | 2003
- 19
-
Some RSA-Based Encryption Schemes with Tight Security ReductionKurosawa, Kaoru / Takagi, Tsuyoshi et al. | 2003
- 37
-
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its ApplicationsBresson, Emmanuel / Catalano, Dario / Pointcheval, David et al. | 2003
- 55
-
Factoring Estimates for a 1024-Bit RSA ModulusLenstra, Arjen / Tromer, Eran / Shamir, Adi / Kortsmit, Wil / Dodson, Bruce / Hughes, James / Leyland, Paul et al. | 2003
- 75
-
Index Calculus Attack for Hyperelliptic Curves of Small GenusThériault, Nicolas et al. | 2003
- 93
-
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic CurvesMishra, Pradeep Kumar / Sarkar, Palash et al. | 2003
- 111
-
Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p – x + dDuursma, Iwan / Lee, Hyang-Sook et al. | 2003
- 124
-
The AGM-X 0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point CountingKohel, David R. et al. | 2003
- 137
-
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key HierarchyMihaljević, Miodrag J. et al. | 2003
- 155
-
Leakage-Resilient Authenticated Key Establishment ProtocolsShin, SeongHan / Kobara, Kazukuni / Imai, Hideki et al. | 2003
- 173
-
Untraceable Fair Network Payment Protocols with Off-Line TTPWang, Chih-Hung et al. | 2003
- 188
-
Incremental Multiset Hash Functions and Their Application to Memory Integrity CheckingClarke, Dwaine / Devadas, Srinivas / Dijk, Marten / Gassend, Blaise / Suh, G. Edward et al. | 2003
- 208
-
New Parallel Domain Extenders for UOWHFLee, Wonil / Chang, Donghoon / Lee, Sangjin / Sung, Soohak / Nandi, Mridul et al. | 2003
- 228
-
Cryptanalysis of 3-Pass HAVALRompay, Bart / Biryukov, Alex / Preneel, Bart / Vandewalle, Joos et al. | 2003
- 246
-
Efficient Group Signatures without TrapdoorsAteniese, Giuseppe / Medeiros, Breno et al. | 2003
- 269
-
Accumulating Composites and Improved Group SigningTsudik, Gene / Xu, Shouhuai et al. | 2003
- 287
-
Almost Uniform Density of Power Residues and the Provable Security of ESIGNOkamoto, Tatsuaki / Stern, Jacques et al. | 2003
- 302
-
Rotations and Translations of Number Field Sieve PolynomialsGower, Jason E. et al. | 2003
- 311
-
On Class Group Computations Using the Number Field SieveBauer, Mark L. / Hamdy, Safuat et al. | 2003
- 326
-
The Secret and Beauty of Ancient Chinese PadlocksYan, Hong-Sen / Huang, Hsing-Hui et al. | 2003
- 331
-
A Traceable Block CipherBillet, Olivier / Gilbert, Henri et al. | 2003
- 347
-
A New Attack against KhazadMuller, Frédéric et al. | 2003
- 359
-
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext AttackKim, Chong Hee / Hwang, Yong Ho / Lee, Pil Joong et al. | 2003
- 374
-
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution SchemesAttrapadung, Nuttapong / Kobara, Kazukuni / Imai, Hideki et al. | 2003
- 392
-
Boneh et al.’s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman AssumptionCoron, Jean-Sebastien / Naccache, David et al. | 2003
- 398
-
On Diophantine Complexity and Statistical Zero-Knowledge ArgumentsLipmaa, Helger et al. | 2003
- 416
-
Verifiable Homomorphic Oblivious Transfer and Private Equality TestLipmaa, Helger et al. | 2003
- 434
-
Generalized Powering Functions and Their Application to Digital SignaturesSato, Hisayoshi / Takagi, Tsuyoshi / Tezuka, Satoru / Takaragi, Kazuo et al. | 2003
- 452
-
Certificateless Public Key CryptographyAl-Riyami, Sattam S. / Paterson, Kenneth G. et al. | 2003
- 474
-
A Complete and Explicit Security Reduction Algorithm for RSA-Based CryptosystemsKurosawa, Kaoru / Schmidt-Samoa, Katja / Takagi, Tsuyoshi et al. | 2003
- 492
-
The Insecurity of Esign in Practical ImplementationsFouque, Pierre-Alain / Howgrave-Graham, Nick / Martinet, Gwenaëlle / Poupard, Guillaume et al. | 2003
- 507
-
Efficient One-Time Proxy SignaturesWang, Huaxiong / Pieprzyk, Josef et al. | 2003
- 523
-
Universal Designated-Verifier SignaturesSteinfeld, Ron / Bull, Laurence / Wang, Huaxiong / Pieprzyk, Josef et al. | 2003