Polly Cracker, Revisited, Revisited (English)
Free access
- New search for: Herold, Gottfried
- New search for: Herold, Gottfried
In:
Public Key Cryptography – PKC 2012
1
;
17-33
;
2012
- Article/Chapter (Book) / Electronic Resource
-
Title:Polly Cracker, Revisited, Revisited
-
Contributors:Herold, Gottfried ( author )
-
Published in:Public Key Cryptography – PKC 2012 , 1 ; 17-33Lecture Notes in Computer Science ; 7293, 1 ; 17-33
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2012-01-01
-
Size:17 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Better Bootstrapping in Fully Homomorphic EncryptionGentry, Craig / Halevi, Shai / Smart, Nigel P. et al. | 2012
- 17
-
Polly Cracker, Revisited, RevisitedHerold, Gottfried et al. | 2012
- 34
-
Ring-LWE in Polynomial RingsDucas, Léo / Durmus, Alain et al. | 2012
- 52
-
On Homomorphic Encryption and Chosen-Ciphertext SecurityHemenway, Brett / Ostrovsky, Rafail et al. | 2012
- 66
-
Waters Signatures with Optimal Security ReductionHofheinz, Dennis / Jager, Tibor / Knapp, Edward et al. | 2012
- 84
-
Strong Security from Probabilistic Signature SchemesSchäge, Sven et al. | 2012
- 102
-
Space Efficient Signature Schemes from the RSA AssumptionYamada, Shota / Hanaoka, Goichiro / Kunihiro, Noboru et al. | 2012
- 120
-
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random OraclesHuang, Qiong / Wong, Duncan S. / Susilo, Willy et al. | 2012
- 138
-
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava CodesCayrel, Pierre-Louis / Hoffmann, Gerhard / Persichetti, Edoardo et al. | 2012
- 156
-
Solving Underdetermined Systems of Multivariate Quadratic Equations RevisitedThomae, Enrico / Wolf, Christopher et al. | 2012
- 172
-
Public-Key Identification Schemes Based on Multivariate Cubic PolynomialsSakumoto, Koichi et al. | 2012
- 190
-
Public-Key Cryptography from New Multivariate Quadratic AssumptionsHuang, Yun-Ju / Liu, Feng-Hao / Yang, Bo-Yin et al. | 2012
- 206
-
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard ModelLibert, Benoît / Paterson, Kenneth G. / Quaglia, Elizabeth A. et al. | 2012
- 225
-
Outsider-Anonymous Broadcast Encryption with Sublinear CiphertextsFazio, Nelly / Perera, Irippuge Milinda et al. | 2012
- 243
-
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate AuthenticationYamada, Shota / Attrapadung, Nuttapong / Santoso, Bagus / Schuldt, Jacob C. N. / Hanaoka, Goichiro / Kunihiro, Noboru et al. | 2012
- 262
-
Public Key Encryption against Related Key AttacksWee, Hoeteck et al. | 2012
- 280
-
Functional Encryption for Threshold Functions (or Fuzzy IBE) from LatticesAgrawal, Shweta / Boyen, Xavier / Vaikuntanathan, Vinod / Voulgaris, Panagiotis / Wee, Hoeteck et al. | 2012
- 298
-
Variants of Waters’ Dual System Primitives Using Asymmetric PairingsRamanna, Somindu C. / Chatterjee, Sanjit / Sarkar, Palash et al. | 2012
- 316
-
From Selective to Full Security: Semi-generic Transformations in the Standard ModelAbdalla, Michel / Fiore, Dario / Lyubashevsky, Vadim et al. | 2012
- 334
-
Circular and KDM Security for Identity-Based EncryptionAlperin-Sheriff, Jacob / Peikert, Chris et al. | 2012
- 353
-
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard ModelSteinfeld, Ron / Ling, San / Pieprzyk, Josef / Tartary, Christophe / Wang, Huaxiong et al. | 2012
- 372
-
Generating Provable Primes Efficiently on Embedded DevicesClavier, Christophe / Feix, Benoit / Thierry, Loïc / Paillier, Pascal et al. | 2012
- 390
-
Password-Based Authenticated Key ExchangePointcheval, David et al. | 2012
- 398
-
Constant-Round Multi-party Private Set Union Using Reversed Laurent SeriesSeo, Jae Hong / Cheon, Jung Hee / Katz, Jonathan et al. | 2012
- 413
-
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy PoliciesStefanov, Emil / Shi, Elaine / Song, Dawn et al. | 2012
- 431
-
Efficiently Shuffling in PublicParampalli, Udaya / Ramchen, Kim / Teague, Vanessa et al. | 2012
- 449
-
Efficient Password Authenticated Key Exchange via Oblivious TransferCanetti, Ran / Dachman-Soled, Dana / Vaikuntanathan, Vinod / Wee, Hoeteck et al. | 2012
- 467
-
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and LatticesFujioka, Atsushi / Suzuki, Koutarou / Xagawa, Keita / Yoneyama, Kazuki et al. | 2012
- 485
-
Relatively-Sound NIZKs and Password-Based Key-ExchangeJutla, Charanjit / Roy, Arnab et al. | 2012
- 504
-
Multi-location Leakage Resilient CryptographyJuma, Ali / Vahlis, Yevgeniy / Yung, Moti et al. | 2012
- 522
-
On Definitions of Selective Opening SecurityBöhl, Florian / Hofheinz, Dennis / Kraschewski, Daniel et al. | 2012
- 540
-
New Definitions and Separations for Circular SecurityCash, David / Green, Matthew / Hohenberger, Susan et al. | 2012
- 558
-
Correlated Product Security from Any One-Way FunctionHemenway, Brett / Lu, Steve / Ostrovsky, Rafail et al. | 2012
- 576
-
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation MechanismsMatsuda, Takahiro / Hanaoka, Goichiro / Matsuura, Kanta et al. | 2012
- 595
-
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic CurveSakemi, Yumi / Hanaoka, Goichiro / Izu, Tetsuya / Takenaka, Masahiko / Yasuda, Masaya et al. | 2012
- 609
-
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s MethodsBauer, Aurélie / Vergnaud, Damien / Zapalowicz, Jean-Christophe et al. | 2012
- 627
-
Extended-DDH and Lossy Trapdoor FunctionsHemenway, Brett / Ostrovsky, Rafail et al. | 2012
- 644
-
DDH-Like Assumptions Based on Extension RingsCramer, Ronald / Damgård, Ivan / Kiltz, Eike / Zakarias, Sarah / Zottarel, Angela et al. | 2012
- 662
-
Security of Blind Signatures RevisitedSchröder, Dominique / Unruh, Dominique et al. | 2012
- 680
-
Efficient Network Coding Signatures in the Standard ModelCatalano, Dario / Fiore, Dario / Warinschi, Bogdan et al. | 2012
- 697
-
Improved Security for Linearly Homomorphic Signatures: A Generic FrameworkFreeman, David Mandell et al. | 2012
- 715
-
On the Security of Dynamic Group Signatures: Preventing Signature HijackingSakai, Yusuke / Schuldt, Jacob C. N. / Emura, Keita / Hanaoka, Goichiro / Ohta, Kazuo et al. | 2012