Scalable Divisible E-cash (English)
- New search for: Canard, Sébastien
- New search for: Pointcheval, David
- New search for: Sanders, Olivier
- New search for: Traoré, Jacques
- New search for: Malkin, Tal
- New search for: Kolesnikov, Vladimir
- New search for: Lewko, Allison Bishop
- New search for: Polychronakis, Michalis
- New search for: Canard, Sébastien
- New search for: Pointcheval, David
- New search for: Sanders, Olivier
- New search for: Traoré, Jacques
In:
Applied Cryptography and Network Security
: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers
;
Chapter: 14
;
287-306
;
2016
- Article/Chapter (Book) / Electronic Resource
-
Title:Scalable Divisible E-cash
-
Additional title:Lect.Notes Computer
-
Contributors:Malkin, Tal ( editor ) / Kolesnikov, Vladimir ( editor ) / Lewko, Allison Bishop ( editor ) / Polychronakis, Michalis ( editor ) / Canard, Sébastien ( author ) / Pointcheval, David ( author ) / Sanders, Olivier ( author ) / Traoré, Jacques ( author )
-
Conference:International Conference on Applied Cryptography and Network Security ; 2015 ; New York, USA
-
Published in:Applied Cryptography and Network Security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers ; Chapter: 14 ; 287-306Lecture Notes in Computer Science ; 9092 ; 287-306Security and Cryptology ; 287-306
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2016-01-09
-
Size:20 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Universally Verifiable Multiparty Computation from Threshold Homomorphic CryptosystemsSchoenmakers, Berry / Veeningen, Meilof et al. | 2016
- 2
-
Communication-Optimal Proactive Secret Sharing for Dynamic GroupsBaron, Joshua / Defrawy, Karim El / Lampkins, Joshua / Ostrovsky, Rafail et al. | 2016
- 3
-
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard ModelXu, Jing / Hu, Xue-Xian / Zhang, Zhen-Feng et al. | 2016
- 4
-
Generic Construction of UC-Secure Oblivious TransferBlazy, Olivier / Chevalier, Céline et al. | 2016
- 5
-
Non-malleability Under Selective Opening Attacks: Implication and SeparationHuang, Zhengan / Liu, Shengli / Mao, Xianping / Chen, Kefei et al. | 2016
- 6
-
A Signature Scheme with a Fuzzy Private KeyTakahashi, Kenta / Matsuda, Takahiro / Murakami, Takao / Hanaoka, Goichiro / Nishigaki, Masakatsu et al. | 2016
- 7
-
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseLiu, Zhen / Wong, Duncan S. et al. | 2016
- 8
-
Zero-Knowledge Authenticated Order Queries and Order Statistics on a ListGhosh, Esha / Ohrimenko, Olga / Tamassia, Roberto et al. | 2016
- 9
-
Private Database Access with HE-over-ORAM ArchitectureGentry, Craig / Halevi, Shai / Jutla, Charanjit / Raykova, Mariana et al. | 2016
- 10
-
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesSeo, Jae Hong / Emura, Keita / Xagawa, Keita / Yoneyama, Kazuki et al. | 2016
- 11
-
LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive DataJiang, Weiyu / Lin, Jingqiang / Wang, Zhan / Li, Huorong / Wang, Lei et al. | 2016
- 12
-
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data NetworkingCompagno, Alberto / Conti, Mauro / Gasti, Paolo / Mancini, Luigi Vincenzo / Tsudik, Gene et al. | 2016
- 13
-
Post-Quantum Forward-Secure Onion RoutingGhosh, Satrajit / Kate, Aniket et al. | 2016
- 14
-
Scalable Divisible E-cashCanard, Sébastien / Pointcheval, David / Sanders, Olivier / Traoré, Jacques et al. | 2016
- 15
-
Recovering Lost Device-Bound CredentialsBaldimtsi, Foteini / Camenisch, Jan / Hanzlik, Lucjan / Krenn, Stephan / Lehmann, Anja / Neven, Gregory et al. | 2016
- 16
-
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSAKircanski, Aleksandar et al. | 2016
- 17
-
Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPULu, Jiqiang / Li, Zhen / Henricksen, Matt et al. | 2016
- 18
-
Evaluation and Cryptanalysis of the Pandaka Lightweight CipherYarom, Yuval / Li, Gefei / Ranasinghe, Damith C. et al. | 2016
- 19
-
Cryptographic Enforcement of Information Flow Policies Without Public InformationCrampton, Jason / Farley, Naomi / Gutin, Gregory / Jones, Mark / Poettering, Bertram et al. | 2016
- 20
-
A Fully Decentralized Data Usage Control Enforcement InfrastructureKelbert, Florian / Pretschner, Alexander et al. | 2016
- 21
-
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online InformationSimeonovski, Milivoj / Bendun, Fabian / Asghar, Muhammad Rizwan / Backes, Michael / Marnau, Ninja / Druschel, Peter et al. | 2016
- 22
-
Exploiting Eye Tracking for Smartphone AuthenticationLiu, Dachuan / Dong, Bo / Gao, Xing / Wang, Haining et al. | 2016
- 23
-
Optimal Proximity Proofs RevisitedKılınç, Handan / Vaudenay, Serge et al. | 2016
- 24
-
Replacement Attacks: Automatically Impeding Behavior-Based Malware SpecificationsMing, Jiang / Xin, Zhi / Lan, Pengwei / Wu, Dinghao / Liu, Peng / Mao, Bing et al. | 2016
- 25
-
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsTakayasu, Atsushi / Kunihiro, Noboru et al. | 2016
- 26
-
Differential Power Analysis of a McEliece CryptosystemChen, Cong / Eisenbarth, Thomas / von Maurich, Ingo / Steinwandt, Rainer et al. | 2016
- 27
-
Arithmetic Addition over Boolean MaskingSchneider, Tobias / Moradi, Amir / Güneysu, Tim et al. | 2016
- 28
-
Foundations of Reconfigurable PUFsSchneider, Jonas / Schröder, Dominique et al. | 2016
- 29
-
mrPUF: A Novel Memristive Device Based Physical Unclonable FunctionGao, Yansong / Ranasinghe, Damith C. / Al-Sarawi, Said F. / Kavehei, Omid / Abbott, Derek et al. | 2016
- 30
-
On the XOR of Multiple Random PermutationsMennink, Bart / Preneel, Bart et al. | 2016
- 31
-
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel AttacksAbdalla, Michel / Belaïd, Sonia / Pointcheval, David / Ruhault, Sylvain / Vergnaud, Damien et al. | 2016
- 32
-
Leakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeAndrychowicz, Marcin / Masny, Daniel / Persichetti, Edoardo et al. | 2016
- 33
-
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak SourcesBackes, Michael / Kate, Aniket / Meiser, Sebastian / Ruffing, Tim et al. | 2016