Polly Cracker, Revisited, Revisited (Englisch)
Freier Zugriff
- Neue Suche nach: Herold, Gottfried
- Neue Suche nach: Herold, Gottfried
In:
Public Key Cryptography – PKC 2012
1
;
17-33
;
2012
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Polly Cracker, Revisited, Revisited
-
Beteiligte:Herold, Gottfried ( Autor:in )
-
Erschienen in:Public Key Cryptography – PKC 2012 , 1 ; 17-33Lecture Notes in Computer Science ; 7293, 1 ; 17-33
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2012
-
Format / Umfang:17 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Better Bootstrapping in Fully Homomorphic EncryptionGentry, Craig / Halevi, Shai / Smart, Nigel P. et al. | 2012
- 17
-
Polly Cracker, Revisited, RevisitedHerold, Gottfried et al. | 2012
- 34
-
Ring-LWE in Polynomial RingsDucas, Léo / Durmus, Alain et al. | 2012
- 52
-
On Homomorphic Encryption and Chosen-Ciphertext SecurityHemenway, Brett / Ostrovsky, Rafail et al. | 2012
- 66
-
Waters Signatures with Optimal Security ReductionHofheinz, Dennis / Jager, Tibor / Knapp, Edward et al. | 2012
- 84
-
Strong Security from Probabilistic Signature SchemesSchäge, Sven et al. | 2012
- 102
-
Space Efficient Signature Schemes from the RSA AssumptionYamada, Shota / Hanaoka, Goichiro / Kunihiro, Noboru et al. | 2012
- 120
-
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random OraclesHuang, Qiong / Wong, Duncan S. / Susilo, Willy et al. | 2012
- 138
-
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava CodesCayrel, Pierre-Louis / Hoffmann, Gerhard / Persichetti, Edoardo et al. | 2012
- 156
-
Solving Underdetermined Systems of Multivariate Quadratic Equations RevisitedThomae, Enrico / Wolf, Christopher et al. | 2012
- 172
-
Public-Key Identification Schemes Based on Multivariate Cubic PolynomialsSakumoto, Koichi et al. | 2012
- 190
-
Public-Key Cryptography from New Multivariate Quadratic AssumptionsHuang, Yun-Ju / Liu, Feng-Hao / Yang, Bo-Yin et al. | 2012
- 206
-
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard ModelLibert, Benoît / Paterson, Kenneth G. / Quaglia, Elizabeth A. et al. | 2012
- 225
-
Outsider-Anonymous Broadcast Encryption with Sublinear CiphertextsFazio, Nelly / Perera, Irippuge Milinda et al. | 2012
- 243
-
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate AuthenticationYamada, Shota / Attrapadung, Nuttapong / Santoso, Bagus / Schuldt, Jacob C. N. / Hanaoka, Goichiro / Kunihiro, Noboru et al. | 2012
- 262
-
Public Key Encryption against Related Key AttacksWee, Hoeteck et al. | 2012
- 280
-
Functional Encryption for Threshold Functions (or Fuzzy IBE) from LatticesAgrawal, Shweta / Boyen, Xavier / Vaikuntanathan, Vinod / Voulgaris, Panagiotis / Wee, Hoeteck et al. | 2012
- 298
-
Variants of Waters’ Dual System Primitives Using Asymmetric PairingsRamanna, Somindu C. / Chatterjee, Sanjit / Sarkar, Palash et al. | 2012
- 316
-
From Selective to Full Security: Semi-generic Transformations in the Standard ModelAbdalla, Michel / Fiore, Dario / Lyubashevsky, Vadim et al. | 2012
- 334
-
Circular and KDM Security for Identity-Based EncryptionAlperin-Sheriff, Jacob / Peikert, Chris et al. | 2012
- 353
-
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard ModelSteinfeld, Ron / Ling, San / Pieprzyk, Josef / Tartary, Christophe / Wang, Huaxiong et al. | 2012
- 372
-
Generating Provable Primes Efficiently on Embedded DevicesClavier, Christophe / Feix, Benoit / Thierry, Loïc / Paillier, Pascal et al. | 2012
- 390
-
Password-Based Authenticated Key ExchangePointcheval, David et al. | 2012
- 398
-
Constant-Round Multi-party Private Set Union Using Reversed Laurent SeriesSeo, Jae Hong / Cheon, Jung Hee / Katz, Jonathan et al. | 2012
- 413
-
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy PoliciesStefanov, Emil / Shi, Elaine / Song, Dawn et al. | 2012
- 431
-
Efficiently Shuffling in PublicParampalli, Udaya / Ramchen, Kim / Teague, Vanessa et al. | 2012
- 449
-
Efficient Password Authenticated Key Exchange via Oblivious TransferCanetti, Ran / Dachman-Soled, Dana / Vaikuntanathan, Vinod / Wee, Hoeteck et al. | 2012
- 467
-
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and LatticesFujioka, Atsushi / Suzuki, Koutarou / Xagawa, Keita / Yoneyama, Kazuki et al. | 2012
- 485
-
Relatively-Sound NIZKs and Password-Based Key-ExchangeJutla, Charanjit / Roy, Arnab et al. | 2012
- 504
-
Multi-location Leakage Resilient CryptographyJuma, Ali / Vahlis, Yevgeniy / Yung, Moti et al. | 2012
- 522
-
On Definitions of Selective Opening SecurityBöhl, Florian / Hofheinz, Dennis / Kraschewski, Daniel et al. | 2012
- 540
-
New Definitions and Separations for Circular SecurityCash, David / Green, Matthew / Hohenberger, Susan et al. | 2012
- 558
-
Correlated Product Security from Any One-Way FunctionHemenway, Brett / Lu, Steve / Ostrovsky, Rafail et al. | 2012
- 576
-
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation MechanismsMatsuda, Takahiro / Hanaoka, Goichiro / Matsuura, Kanta et al. | 2012
- 595
-
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic CurveSakemi, Yumi / Hanaoka, Goichiro / Izu, Tetsuya / Takenaka, Masahiko / Yasuda, Masaya et al. | 2012
- 609
-
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s MethodsBauer, Aurélie / Vergnaud, Damien / Zapalowicz, Jean-Christophe et al. | 2012
- 627
-
Extended-DDH and Lossy Trapdoor FunctionsHemenway, Brett / Ostrovsky, Rafail et al. | 2012
- 644
-
DDH-Like Assumptions Based on Extension RingsCramer, Ronald / Damgård, Ivan / Kiltz, Eike / Zakarias, Sarah / Zottarel, Angela et al. | 2012
- 662
-
Security of Blind Signatures RevisitedSchröder, Dominique / Unruh, Dominique et al. | 2012
- 680
-
Efficient Network Coding Signatures in the Standard ModelCatalano, Dario / Fiore, Dario / Warinschi, Bogdan et al. | 2012
- 697
-
Improved Security for Linearly Homomorphic Signatures: A Generic FrameworkFreeman, David Mandell et al. | 2012
- 715
-
On the Security of Dynamic Group Signatures: Preventing Signature HijackingSakai, Yusuke / Schuldt, Jacob C. N. / Emura, Keita / Hanaoka, Goichiro / Ohta, Kazuo et al. | 2012