[BOOK][B] Advances in CryptologyEUROCRYPT'95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21�…

LC Guillou, JJ Quisquater - 2003 - books.google.com
conferences: CRYPTO, every summer at the University of California, Santa Barbara (UCSB),
and EUROCRYPT… Moreover, the Association edits quarterly the Journal of Cryptology (JoC). …

[BOOK][B] Advances in Cryptology 1981-1997: Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conference, 1981-1997

KS McCurley, CD Ziegler - 2003 - books.google.com
CRYPTO is held each year in August at the University of … by the University of California,
Santa Barbara, and have had … increase the security of cryptographic algorithms. For example, …

[BOOK][B] Advances in Cryptology-CRYPTO'87: Proceedings

C Pomerance - 2003 - books.google.com
proceedings of CRYPTO'87, one in a series of annual conferences devoted to cryptologic
as a whole, GB Agnew also took care of local arrangements in Santa Barbara. We all owe him …

[BOOK][B] …�in CryptologyCRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings�…

D Micciancio, T Ristenpart - 2020 - books.google.com
… known techniques, and our batched Camenisch-Shoup encryptioncryptographic schemes
in Sect.3 and present our private intersection-sum protocol in Sect.4. Our batching techniques

Some recent research aspects of threshold cryptography

Y Desmedt�- International Workshop on Information Security, 1997 - Springer
… Now we explain how to use this scheme for threshold RSA [20]. Assume, as in [19], that n
is the product of primes of equal length 2. The distributor chooses the shares as we explained …

[BOOK][B] Financial Cryptography: 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000 Proceedings

Y Frankel - 2003 - books.google.com
… User revocation: This work presents simple and efficient methods for user revocation (a
process also known as user exclusion, or blacklisting). These methods operate in the following …

A survey of algebraic properties used in cryptographic protocols

V Cortier, S Delaune…�- Journal of Computer�…, 2006 - content.iospress.com
… or semi-decision procedures that have been obtained so far for some algebraic properties
using formal methods. After a brief description on how cryptographic protocols are modeled (…

A cryptographic solution to a game theoretic problem

Y Dodis, S Halevi, T Rabin�- …�Conference Santa Barbara, California, USA�…, 2000 - Springer
… In this work we use cryptography to solve a game-theoretic problem which arises naturally
in the area of two party strategic games. The standard game-theoretic solution concept for …

Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption)

Y Zheng�- …�Cryptology Conference Santa Barbara, California, USA�…, 1997 - Springer
… We will show how the question can be answered positively by the use of a new cryptographic
… is a cryptographic method that fulfills both the functions of secure encryption and digital …

[PDF][PDF] Cryptographic algorithms: a review of the literature, weaknesses and open challenges

Y Salami, V Khajevand, E Zeinali�- J. Comput. Robot, 2023 - journals.iau.ir
… architecture for each round of the cryptographic process. … the parities [86][87]. The DES
algorithm is composed of … SYM key encryption algorithm designed by Ron Rivest in 1987