Pseudorandom Functions and Lattices (Englisch)
Freier Zugriff
- Neue Suche nach: Banerjee, Abhishek
- Neue Suche nach: Peikert, Chris
- Neue Suche nach: Rosen, Alon
- Neue Suche nach: Banerjee, Abhishek
- Neue Suche nach: Peikert, Chris
- Neue Suche nach: Rosen, Alon
In:
Advances in Cryptology – EUROCRYPT 2012
15
;
719-737
;
2012
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Pseudorandom Functions and Lattices
-
Beteiligte:
-
Erschienen in:Advances in Cryptology – EUROCRYPT 2012 , 15 ; 719-737Lecture Notes in Computer Science ; 7237, 15 ; 719-737
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2012
-
Format / Umfang:19 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A Tutorial on High Performance Computing Applied to CryptanalysisJoux, Antoine et al. | 2012
- 8
-
Another Look at Provable SecurityMenezes, Alfred et al. | 2012
- 9
-
Cover and Decomposition Index Calculus on Elliptic Curves Made PracticalJoux, Antoine / Vitse, Vanessa et al. | 2012
- 27
-
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary FieldsFaugère, Jean-Charles / Perret, Ludovic / Petit, Christophe / Renault, Guénaël et al. | 2012
- 45
-
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public PermutationsBogdanov, Andrey / Knudsen, Lars R. / Leander, Gregor / Standaert, Francois-Xavier / Steinberger, John / Tischhauser, Elmar et al. | 2012
- 63
-
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized CascadingGaži, Peter / Tessaro, Stefano et al. | 2012
- 81
-
Fair Computation with Rational PlayersGroce, Adam / Katz, Jonathan et al. | 2012
- 99
-
Concurrently Secure Computation in Constant RoundsGarg, Sanjam / Goyal, Vipul / Jain, Abhishek / Sahai, Amit et al. | 2012
- 117
-
Identity-Based Encryption Resilient to Continual Auxiliary LeakageYuen, Tsz Hon / Chow, Sherman S. M. / Zhang, Ye / Yiu, Siu Ming et al. | 2012
- 135
-
Quantum Proofs of KnowledgeUnruh, Dominique et al. | 2012
- 153
-
On Round-Optimal Zero Knowledge in the Bare Public-Key ModelScafuro, Alessandra / Visconti, Ivan et al. | 2012
- 172
-
Robust Coin FlippingKopp, Gene S. / Wiltshire-Gordon, John D. et al. | 2012
- 195
-
Unconditionally-Secure Robust Secret Sharing with Compact SharesCevallos, Alfonso / Fehr, Serge / Ostrovsky, Rafail / Rabani, Yuval et al. | 2012
- 209
-
All-But-Many Lossy Trapdoor FunctionsHofheinz, Dennis et al. | 2012
- 228
-
Identity-Based (Lossy) Trapdoor Functions and ApplicationsBellare, Mihir / Kiltz, Eike / Peikert, Chris / Waters, Brent et al. | 2012
- 246
-
Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and MoreWee, Hoeteck et al. | 2012
- 263
-
Efficient Zero-Knowledge Argument for Correctness of a ShuffleBayer, Stephanie / Groth, Jens et al. | 2012
- 281
-
Malleable Proof Systems and ApplicationsChase, Melissa / Kohlweiss, Markulf / Lysyanskaya, Anna / Meiklejohn, Sarah et al. | 2012
- 301
-
Group to Group Commitments Do Not ShrinkAbe, Masayuki / Haralambiev, Kristiyan / Ohkubo, Miyako et al. | 2012
- 318
-
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order SettingLewko, Allison et al. | 2012
- 336
-
Minimalism in Cryptography: The Even-Mansour Scheme RevisitedDunkelman, Orr / Keller, Nathan / Shamir, Adi et al. | 2012
- 355
-
Message Authentication, RevisitedDodis, Yevgeniy / Kiltz, Eike / Pietrzak, Krzysztof / Wichs, Daniel et al. | 2012
- 375
-
Property Preserving Symmetric EncryptionPandey, Omkant / Rouselakis, Yannis et al. | 2012
- 392
-
Narrow-Bicliques: Cryptanalysis of Full IDEAKhovratovich, Dmitry / Leurent, Gaëtan / Rechberger, Christian et al. | 2012
- 411
-
Cryptanalyses on a Merkle-Damgård Based MAC — Almost Universal Forgery and Distinguishing-H AttacksSasaki, Yu et al. | 2012
- 428
-
Statistical Tools Flavor Side-Channel Collision AttacksMoradi, Amir et al. | 2012
- 446
-
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the IntegersCoron, Jean-Sébastien / Naccache, David / Tibouchi, Mehdi et al. | 2012
- 465
-
Fully Homomorphic Encryption with Polylog OverheadGentry, Craig / Halevi, Shai / Smart, Nigel P. et al. | 2012
- 483
-
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHEAsharov, Gilad / Jain, Abhishek / López-Alt, Adriana / Tromer, Eran / Vaikuntanathan, Vinod / Wichs, Daniel et al. | 2012
- 502
-
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the IntegersChen, Yuanmi / Nguyen, Phong Q. et al. | 2012
- 520
-
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set DecodingBecker, Anja / Joux, Antoine / May, Alexander / Meurer, Alexander et al. | 2012
- 537
-
Optimal Security Proofs for Full Domain Hash, RevisitedKakvi, Saqib A. / Kiltz, Eike et al. | 2012
- 554
-
On the Exact Security of Schnorr-Type Signatures in the Random Oracle ModelSeurin, Yannick et al. | 2012
- 572
-
Tightly-Secure Signatures from Lossy Identification SchemesAbdalla, Michel / Fouque, Pierre-Alain / Lyubashevsky, Vadim / Tibouchi, Mehdi et al. | 2012
- 591
-
Adaptively Attribute-Hiding (Hierarchical) Inner Product EncryptionOkamoto, Tatsuaki / Takashima, Katsuyuki et al. | 2012
- 609
-
Scalable Group Signatures with RevocationLibert, Benoît / Peters, Thomas / Yung, Moti et al. | 2012
- 628
-
Incremental Deterministic Public-Key EncryptionMironov, Ilya / Pandey, Omkant / Reingold, Omer / Segev, Gil et al. | 2012
- 645
-
Standard Security Does Not Imply Security against Selective-OpeningBellare, Mihir / Dowsley, Rafael / Waters, Brent / Yilek, Scott et al. | 2012
- 663
-
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext SecurityHohenberger, Susan / Lewko, Allison / Waters, Brent et al. | 2012
- 682
-
Security of Symmetric Encryption in the Presence of Ciphertext FragmentationBoldyreva, Alexandra / Degabriele, Jean Paul / Paterson, Kenneth G. / Stam, Martijn et al. | 2012
- 700
-
Trapdoors for Lattices: Simpler, Tighter, Faster, SmallerMicciancio, Daniele / Peikert, Chris et al. | 2012
- 719
-
Pseudorandom Functions and LatticesBanerjee, Abhishek / Peikert, Chris / Rosen, Alon et al. | 2012
- 738
-
Lattice Signatures without TrapdoorsLyubashevsky, Vadim et al. | 2012