\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf{PERKS}$$\end{document}: Persistent and Distributed Key Acquisition for Secure Storage from Passwords (Englisch)
- Neue Suche nach: Davies, Gareth T.
- Neue Suche nach: Pijnenburg, Jeroen
- Neue Suche nach: Smith, Benjamin
- Neue Suche nach: Wu, Huapeng
- Neue Suche nach: Davies, Gareth T.
- Neue Suche nach: Pijnenburg, Jeroen
In:
Selected Areas in Cryptography
: 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers
;
Kapitel: 8
;
159-189
;
2024
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf{PERKS}$$\end{document}: Persistent and Distributed Key Acquisition for Secure Storage from Passwords
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Smith, Benjamin ( Herausgeber:in ) / Wu, Huapeng ( Herausgeber:in ) / Davies, Gareth T. ( Autor:in ) / Pijnenburg, Jeroen ( Autor:in )
-
Kongress:International Conference on Selected Areas in Cryptography ; 2022 ; Windsor, ON, Canada
-
Erschienen in:Selected Areas in Cryptography : 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers ; Kapitel: 8 ; 159-189Lecture Notes in Computer Science ; 13742 ; 159-189
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:12.05.2024
-
Format / Umfang:31 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Profiling Side-Channel Attacks on DilithiumUlitzsch, Vincent Quentin / Marzougui, Soundes / Tibouchi, Mehdi / Seifert, Jean-Pierre et al. | 2024
- 2
-
On the Weakness of Ring-LWE mod Prime Ideal \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathfrak {q}$$\end{document} by Trace MapTakahashi, Tomoka / Okumura, Shinya / Miyaji, Atsuko et al. | 2024
- 3
-
2DT-GLS: Faster and Exception-Free Scalar Multiplication in the GLS254 Binary CurveAardal, Marius A. / Aranha, Diego F. et al. | 2024
- 4
-
Key-Recovery Attacks on CRAFT and WARPSun, Ling / Wang, Wei / Wang, Meiqin et al. | 2024
- 5
-
Differential Analysis of the Ternary Hash Function TroikaBoura, Christina / Funk, Margot / Rotella, Yann et al. | 2024
- 6
-
Another Look at Differential-Linear AttacksDunkelman, Orr / Weizman, Ariel et al. | 2024
- 7
-
Injective Rank Metric Trapdoor Functions with Homogeneous ErrorsBurle, Étienne / Gaborit, Philippe / Hatri, Younes / Otmani, Ayoub et al. | 2024
- 8
-
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf{PERKS}$$\end{document}: Persistent and Distributed Key Acquisition for Secure Storage from PasswordsDavies, Gareth T. / Pijnenburg, Jeroen et al. | 2024
- 9
-
Improved Circuit-Based PSI via Equality Preserving CompressionHan, Kyoohyung / Moon, Dukjae / Son, Yongha et al. | 2024
- 10
-
Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 ChallengeUdovenko, Aleksei / Vitto, Giuseppe et al. | 2024
- 11
-
Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKECampos, Fabio / Meyer, Michael / Reijnders, Krijn / Stöttinger, Marc et al. | 2024
- 12
-
An Effective Lower Bound on the Number of Orientable Supersingular Elliptic CurvesLeroux, Antonin et al. | 2024
- 13
-
Finding All Impossible Differentials When Considering the DDTHu, Kai / Peyrin, Thomas / Wang, Meiqin et al. | 2024
- 14
-
A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext PairZhang, Lulu / Liu, Meicheng / Lin, Dongdai et al. | 2024
- 15
-
Collision-Based Attacks on White-Box Implementations of the AES Block CipherLu, Jiqiang / Wang, Mingxue / Wang, Can / Yang, Chen et al. | 2024
- 16
-
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATANBiryukov, Alex / Teh, Je Sen / Udovenko, Aleksei et al. | 2024
- 17
-
Improved the Automated Evaluation Algorithm Against Differential Attacks and Its Application to WARPShi, Jiali / Liu, Guoqiang / Li, Chao et al. | 2024
- 18
-
Faster Cryptographic Hash Function from Supersingular Isogeny GraphsDoliskani, Javad / Pereira, Geovandro C. C. F. / Barreto, Paulo S. L. M. et al. | 2024
- 19
-
From Plaintext-Extractability to IND-CCA SecurityEbrahimi, Ehsan et al. | 2024
- 20
-
Farasha: A Provable Permutation-Based Parallelizable PRFAaraj, Najwa / Bellini, Emanuele / Jejurikar, Ravindra / Manzano, Marc / Rohit, Raghvendra / Salazar, Eugenio et al. | 2024
- 21
-
A Sponge-Based PRF with Good Multi-user SecurityBhattacharjee, Arghya / Bhaumik, Ritam / Nandi, Mridul et al. | 2024