Secure Set Intersection with Untrusted Hardware Tokens (English)
- New search for: Fischlin, Marc
- New search for: Pinkas, Benny
- New search for: Sadeghi, Ahmad-Reza
- New search for: Schneider, Thomas
- New search for: Visconti, Ivan
- New search for: Fischlin, Marc
- New search for: Pinkas, Benny
- New search for: Sadeghi, Ahmad-Reza
- New search for: Schneider, Thomas
- New search for: Visconti, Ivan
In:
Topics in Cryptology – CT-RSA 2011
1
;
1-16
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:Secure Set Intersection with Untrusted Hardware Tokens
-
Contributors:Fischlin, Marc ( author ) / Pinkas, Benny ( author ) / Sadeghi, Ahmad-Reza ( author ) / Schneider, Thomas ( author ) / Visconti, Ivan ( author )
-
Published in:Topics in Cryptology – CT-RSA 2011 , 1 ; 1-16Lecture Notes in Computer Science ; 6558, 1 ; 1-16
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Secure Set Intersection with Untrusted Hardware TokensFischlin, Marc / Pinkas, Benny / Sadeghi, Ahmad-Reza / Schneider, Thomas / Visconti, Ivan et al. | 2011
- 17
-
Efficient Secure Two-Party ExponentiationYu, Ching-Hua / Chow, Sherman S. M. / Chung, Kai-Min / Liu, Feng-Hao et al. | 2011
- 33
-
A General, Flexible and Efficient Proof of Inclusion and ExclusionPeng, Kun et al. | 2011
- 49
-
Non-interactive Confirmer SignaturesChow, Sherman S. M. / Haralambiev, Kristiyan et al. | 2011
- 65
-
Communication-Efficient 2-Round Group Key Establishment from PairingsNeupane, Kashi / Steinwandt, Rainer et al. | 2011
- 77
-
Defeating RSA Multiply-Always and Message Blinding CountermeasuresWitteman, Marc F. / Woudenberg, Jasper G. J. / Menarini, Federico et al. | 2011
- 89
-
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace PatternsRebeiro, Chester / Mukhopadhyay, Debdeep et al. | 2011
- 104
-
Improving Differential Power Analysis by Elastic AlignmentWoudenberg, Jasper G. J. / Witteman, Marc F. / Bakker, Bram et al. | 2011
- 120
-
NSA’s Role in the Development of DESGeorge, Richard M. et al. | 2011
- 121
-
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysFujioka, Atsushi / Suzuki, Koutarou et al. | 2011
- 142
-
Contributory Password-Authenticated Group Key Exchange with Join CapabilityAbdalla, Michel / Chevalier, Céline / Granboulan, Louis / Pointcheval, David et al. | 2011
- 161
-
Ideal Key Derivation and Encryption in Simulation-Based SecurityKüsters, Ralf / Tuengerthal, Max et al. | 2011
- 180
-
Beyond Provable Security Verifiable IND-CCA Security of OAEPBarthe, Gilles / Grégoire, Benjamin / Lakhnech, Yassine / Zanella Béguelin, Santiago et al. | 2011
- 197
-
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision ApproachWang, Lei / Sasaki, Yu / Komatsubara, Wataru / Ohta, Kazuo / Sakiyama, Kazuo et al. | 2011
- 213
-
MJH: A Faster Alternative to MDC-2Lee, Jooyoung / Stam, Martijn et al. | 2011
- 237
-
Online Ciphers from Tweakable BlockciphersRogaway, Phillip / Zhang, Haibin et al. | 2011
- 250
-
Meet-in-the-Middle Attacks on Reduced-Round XTEASekar, Gautham / Mouha, Nicky / Velichkov, Vesselin / Preneel, Bart et al. | 2011
- 268
-
Expedient Non-malleability Notions for Hash FunctionsBaecher, Paul / Fischlin, Marc / Schröder, Dominique et al. | 2011
- 284
-
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant ProtocolsStebila, Douglas / Kuppusamy, Lakshmi / Rangasamy, Jothi / Boyd, Colin / Gonzalez Nieto, Juan et al. | 2011
- 302
-
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption SchemesBaek, Joonsang / Chu, Cheng-Kang / Zhou, Jianying et al. | 2011
- 319
-
Better Key Sizes (and Attacks) for LWE-Based EncryptionLindner, Richard / Peikert, Chris et al. | 2011
- 340
-
Binary Huff CurvesDevigne, Julien / Joye, Marc et al. | 2011
- 356
-
A Variant of the F4 AlgorithmJoux, Antoine / Vitse, Vanessa et al. | 2011
- 376
-
Attribute-Based SignaturesMaji, Hemanta K. / Prabhakaran, Manoj / Rosulek, Mike et al. | 2011
- 393
-
Sub-linear Size Traceable Ring Signatures without Random OraclesFujisaki, Eiichiro et al. | 2011