Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited (English)
- New search for: Kurosawa, Kaoru
- New search for: Trieu Phong, Le
- New search for: Kurosawa, Kaoru
- New search for: Trieu Phong, Le
In:
Progress in Cryptology – AFRICACRYPT 2014
1
;
51-68
;
2014
- Article/Chapter (Book) / Electronic Resource
-
Title:Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited
-
Contributors:Kurosawa, Kaoru ( author ) / Trieu Phong, Le ( author )
-
Published in:Progress in Cryptology – AFRICACRYPT 2014 , 1 ; 51-68Lecture Notes in Computer Science ; 8469, 1 ; 51-68
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2014-01-01
-
Size:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
New Results for Rank-Based CryptographyGaborit, Philippe / Ruatta, Olivier / Schrek, Julien / Zémor, Gilles et al. | 2014
- 13
-
Proxy Re-Encryption Scheme Supporting a Selection of DelegateesDevigne, Julien / Guerrini, Eleonora / Laguillaumie, Fabien et al. | 2014
- 31
-
Trapdoor Privacy in Asymmetric Searchable Encryption SchemesArriaga, Afonso / Tang, Qiang / Ryan, Peter et al. | 2014
- 51
-
Kurosawa-Desmedt Key Encapsulation Mechanism, RevisitedKurosawa, Kaoru / Trieu Phong, Le et al. | 2014
- 69
-
Differential Biases in Reduced-Round KeccakDas, Sourav / Meier, Willi et al. | 2014
- 88
-
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-SymmetryKuila, Sukhendu / Saha, Dhiman / Pal, Madhumangal / Roy Chowdhury, Dipanwita et al. | 2014
- 109
-
Preimage Attacks on Reduced-Round StribogAlTawy, Riham / Youssef, Amr M. et al. | 2014
- 126
-
Breaking the IOC Authenticated Encryption ModeBottinelli, Paul / Reyhanitabar, Reza / Vaudenay, Serge et al. | 2014
- 136
-
New Treatment of the BSW Sampling and Its Applications to Stream CiphersDing, Lin / Jin, Chenhui / Guan, Jie / Qi, Chuanda et al. | 2014
- 147
-
Multidimensional Zero-Correlation Linear Cryptanalysis of E2Wen, Long / Wang, Meiqin / Bogdanov, Andrey et al. | 2014
- 165
-
Further Improvement of Factoring RSA Moduli with Implicit HintPeng, Liqiang / Hu, Lei / Xu, Jun / Huang, Zhangjie / Xie, Yonghong et al. | 2014
- 178
-
New Attacks on the RSA CryptosystemNitaj, Abderrahmane / Ariffin, Muhammad Rezal Kamel / Nassr, Dieaa I. / Bahig, Hatem M. et al. | 2014
- 199
-
Formulae for Computation of Tate Pairing on Hyperelliptic Curve Using Hyperelliptic NetsTran, Christophe et al. | 2014
- 215
-
New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR MicrocontrollersLiu, Zhe / Großschädl, Johann et al. | 2014
- 235
-
Minimizing S-Boxes in Hardware by Utilizing Linear TransformationsKutzner, Sebastian / Nguyen, Phuong Ha / Poschmann, Axel / Stöttinger, Marc et al. | 2014
- 251
-
Efficient Masked S-Boxes Processing – A Step Forward –Grosso, Vincent / Prouff, Emmanuel / Standaert, François-Xavier et al. | 2014
- 267
-
A More Efficient AES Threshold ImplementationBilgin, Begül / Gierlichs, Benedikt / Nikova, Svetla / Nikov, Ventzislav / Rijmen, Vincent et al. | 2014
- 285
-
Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix SumOhara, Kazuma / Ohta, Kazuo / Suzuki, Koutarou / Yoneyama, Kazuki et al. | 2014
- 300
-
Position-Based Cryptography from Noisy ChannelsDziembowski, Stefan / Zdanowicz, Maciej et al. | 2014
- 318
-
A Comparison of the Homomorphic Encryption Schemes FV and YASHELepoint, Tancrède / Naehrig, Michael et al. | 2014
- 336
-
Towards Lattice Based Aggregate SignaturesBansarkhani, Rachid / Buchmann, Johannes et al. | 2014
- 356
-
A Second Look at Fischlin’s TransformationDagdelen, Özgür / Venturi, Daniele et al. | 2014
- 377
-
Anonymous IBE from Quadratic Residuosity with Improved PerformanceClear, Michael / Tewari, Hitesh / McGoldrick, Ciarán et al. | 2014
- 398
-
Expressive Attribute Based Signcryption with Constant-Size CiphertextRao, Y. Sreenivasa / Dutta, Ratna et al. | 2014
- 420
-
DRECON: DPA Resistant Encryption by ConstructionHajra, Suvadeep / Rebeiro, Chester / Bhasin, Shivam / Bajaj, Gaurav / Sharma, Sahil / Guilley, Sylvain / Mukhopadhyay, Debdeep et al. | 2014
- 440
-
Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression FunctionsAbed, Farzaneh / Forler, Christian / List, Eik / Lucks, Stefan / Wenzel, Jakob et al. | 2014
- 459
-
Universal Hash-Function Families: From Hashing to AuthenticationAlomair, Basel et al. | 2014