Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency (English)
- New search for: Wang, Yuyu
- New search for: Tanaka, Keisuke
- New search for: Foo, Ernest
- Further information on Foo, Ernest:
- https://orcid.org/https://orcid.org/0000-0002-3971-6415
- New search for: Stebila, Douglas
- New search for: Wang, Yuyu
- New search for: Tanaka, Keisuke
In:
Information Security and Privacy
: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
;
Chapter: 13
;
213-229
;
2015
- Article/Chapter (Book) / Electronic Resource
-
Title:Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency
-
Additional title:Lect.Notes Computer
-
Contributors:Foo, Ernest ( editor ) / Stebila, Douglas ( editor ) / Wang, Yuyu ( author ) / Tanaka, Keisuke ( author )
-
Conference:Australasian Conference on Information Security and Privacy ; 2015 ; Brisbane, QLD, Australia
-
Published in:Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ; Chapter: 13 ; 213-229Lecture Notes in Computer Science ; 9144 ; 213-229Security and Cryptology ; 213-229
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2015-06-25
-
Size:17 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering SchemesSun, Zhelei / Wang, Peng / Zhang, Liting et al. | 2015
- 2
-
Cryptanalysis of Reduced-Round WhirlwindMa, Bingke / Li, Bao / Hao, Ronglin / Li, Xiaoqian et al. | 2015
- 3
-
Improving the Biclique Cryptanalysis of AESTao, Biaoshuai / Wu, Hongjun et al. | 2015
- 4
-
A New General Framework for Secure Public Key Encryption with Keyword SearchChen, Rongmao / Mu, Yi / Yang, Guomin / Guo, Fuchun / Wang, Xiaofen et al. | 2015
- 5
-
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsSakai, Yusuke / Emura, Keita / Schuldt, Jacob C.N. / Hanaoka, Goichiro / Ohta, Kazuo et al. | 2015
- 6
-
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageBansal, Tarun Kumar / Chang, Donghoon / Sanadhya, Somitra Kumar et al. | 2015
- 7
-
Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNSNegre, Christophe / Perin, Guilherme et al. | 2015
- 8
-
Towards Forward Security Properties for PEKS and IBETang, Qiang et al. | 2015
- 9
-
IBE Under \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k$$\end{document}-LIN with Shorter Ciphertexts and Private KeysKurosawa, Kaoru / Phong, Le Trieu et al. | 2015
- 10
-
Improved Identity-Based Online/Offline EncryptionLai, Jianchang / Mu, Yi / Guo, Fuchun / Susilo, Willy et al. | 2015
- 11
-
Constructions of CCA-Secure Revocable Identity-Based EncryptionIshida, Yuu / Watanabe, Yohei / Shikata, Junji et al. | 2015
- 12
-
Linkable Message Tagging: Solving the Key Distribution Problem of Signature SchemesGünther, Felix / Poettering, Bertram et al. | 2015
- 13
-
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyWang, Yuyu / Tanaka, Keisuke et al. | 2015
- 14
-
Constant Size Ring Signature Without Random OracleBose, Priyanka / Das, Dipanjan / Rangan, Chandrasekharan Pandu et al. | 2015
- 15
-
Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionZhang, Tingting / Li, Hongda / Huang, Guifang et al. | 2015
- 16
-
Modelling Ciphersuite and Version Negotiation in the TLS ProtocolDowling, Benjamin / Stebila, Douglas et al. | 2015
- 17
-
VisRAID: Visualizing Remote Access for Intrusion DetectionTrethowen, Leliel / Anslow, Craig / Marshall, Stuart / Welch, Ian et al. | 2015
- 18
-
BP-XACML an Authorisation Policy Language for Business ProcessesAlissa, Khalid / Reid, Jason / Dawson, Ed / Salim, Farzad et al. | 2015
- 19
-
How TKIP Induces Biases of Internal States of Generic RC4Ito, Ryoma / Miyaji, Atsuko et al. | 2015
- 20
-
Preventing Fault Attacks Using Fault Randomization with a Case Study on AESGhosh, Shamit / Saha, Dhiman / Sengupta, Abhrajit / Roy Chowdhury, Dipanwita et al. | 2015
- 21
-
Analysis of Rainbow Tables with FingerprintsAvoine, Gildas / Bourgeois, Adrien / Carpent, Xavier et al. | 2015
- 22
-
A New Public Remote Integrity Checking Scheme with User PrivacyFeng, Yiteng / Mu, Yi / Yang, Guomin / Liu, Joseph K. et al. | 2015
- 23
-
Efficient Dynamic Provable Data Possession with Public Verifiability and Data PrivacyGritti, Clémentine / Susilo, Willy / Plantard, Thomas et al. | 2015
- 24
-
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom FiltersEgert, Rolf / Fischlin, Marc / Gens, David / Jacob, Sven / Senker, Matthias / Tillmanns, Jörn et al. | 2015
- 25
-
Generalizing PMAC Under Weaker AssumptionsDatta, Nilanjan / Yasuda, Kan et al. | 2015
- 26
-
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained DevicesAgrawal, Megha / Chang, Donghoon / Sanadhya, Somitra et al. | 2015
- 27
-
Secure Statistical Analysis Using RLWE-Based Homomorphic EncryptionYasuda, Masaya / Shimoyama, Takeshi / Kogure, Jun / Yokoyama, Kazuhiro / Koshiba, Takeshi et al. | 2015
- 28
-
Bad Directions in Cryptographic Hash FunctionsBernstein, Daniel J. / Hülsing, Andreas / Lange, Tanja / Niederhagen, Ruben et al. | 2015