×

Found 295 Documents (Results 1–100)

Functional encryption with secure key leasing. (English) Zbl 1524.68122

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13794, 569-598 (2023).

The state of the union: union-only signatures for data aggregation. (English) Zbl 1518.94104

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 13th International conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13409, 387-410 (2022).
MSC:  94A62 94A60 68P25

Public-key watermarking schemes for pseudorandom functions. (English) Zbl 1514.68068

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 637-667 (2022).
MSC:  68P25 68N99 94A60
Full Text: DOI

SPEEDY on Cortex-M3: efficient software implementation of SPEEDY on ARM Cortex-M3. (English) Zbl 07628063

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 434-444 (2022).
MSC:  68M25 68P25 94A60
Full Text: DOI

Beyond software watermarking: traitor-tracing for pseudorandom functions. (English) Zbl 07684807

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 250-280 (2021).
MSC:  68P25 68Nxx 94A60
Full Text: DOI

The matrix reloaded: multiplication strategies in FrodoKEM. (English) Zbl 1504.94108

Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 72-91 (2021).
Full Text: DOI

OptORAMa: optimal oblivious RAM. (English) Zbl 07496557

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 403-432 (2020).
MSC:  68P25 68Nxx 94A60
Full Text: DOI

Watermarking public-key cryptographic primitives. (English) Zbl 1509.94160

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 367-398 (2019).
Full Text: DOI

The simplest multi-key linearly homomorphic signature scheme. (English) Zbl 1453.94129

Schwabe, Peter (ed.) et al., Progress in cryptology – LATINCRYPT 2019. 6th international conference on cryptology and information security in Latin America, Santiago de Chile, Chile, October 2–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11774, 280-300 (2019).
MSC:  94A62 68P25

Secure number theoretic transform and speed record for Ring-LWE encryption on embedded processors. (English) Zbl 1504.68028

Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 175-188 (2018).
MSC:  68M25 94A60

NTRU prime: reducing attack surface at low cost. (English) Zbl 1384.94034

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 235-260 (2018).
MSC:  94A60 81P94

A secure and efficient implementation of the quotient digital signature algorithm (qDSA). (English) Zbl 1506.94079

Ali, Sk Subidh (ed.) et al., Security, privacy, and applied cryptography engineering. 7th international conference, SPACE 2017, Goa, India, December 13–17, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10662, 170-189 (2017).
MSC:  94A62 94A60 68P25
Full Text: DOI

McBits revisited. (English) Zbl 1450.94029

Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 213-231 (2017).
MSC:  94A60
Full Text: DOI

A full RNS variant of FV like somewhat homomorphic encryption schemes. (English) Zbl 1418.94029

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 423-442 (2017).
MSC:  94A60 68M07

Feeding two cats with one bowl: on designing a fault and side-channel resistant software encoding scheme. (English) Zbl 1383.94014

Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 77-94 (2017).
MSC:  94A60 68P25
Full Text: DOI

IND-CCA secure hybrid encryption from QC-MDPC Niederreiter. (English) Zbl 1334.94097

Takagi, Tsuyoshi (ed.), Post-quantum cryptography. 7th international workshop, PQCrypto 2016, Fukuoka, Japan, February 24–26, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29359-2/pbk; 978-3-319-29360-8/ebook). Lecture Notes in Computer Science 9606, 1-17 (2016).
MSC:  94A60 81P94
Full Text: DOI

Parallel implementations of LEA. (English) Zbl 1368.94128

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 256-274 (2014).
MSC:  94A60 68P25
Full Text: DOI

Towards side-channel resistant implementations of QC-MDPC McEliece encryption on constrained devices. (English) Zbl 1306.94099

Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 266-282 (2014).
MSC:  94A60 81P94 68P25
Full Text: DOI

Three design dimensions of secure embedded systems. (English) Zbl 1318.68045

Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 1-20 (2013).
MSC:  68M10 68P25 94A60
Full Text: DOI

Highly accurate key extraction method for access-driven cache attacks using correlation coefficient. (English) Zbl 1316.94089

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 286-301 (2013).
MSC:  94A60 68P25
Full Text: DOI

Randomly failed! The state of randomness in current Java implementations. (English) Zbl 1314.68124

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 129-144 (2013).
MSC:  68P25 68N99 94A60
Full Text: DOI

Lightweight cryptography for the cloud: exploit the power of bitslice implementation. (English) Zbl 1294.94063

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 408-425 (2012).
MSC:  94A60 68P25
Full Text: DOI

High speed implementation of authenticated encryption for the MSP430X microcontroller. (English) Zbl 1304.94102

Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 288-304 (2012).
MSC:  94A62 94A60 68P25
Full Text: DOI

Software optimizations for cryptographic primitives on general purpose x86_64 platforms. (English) Zbl 1292.68051

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 399-400 (2011).
MSC:  68P25 94A60
Full Text: DOI

From exponential to polynomial-time security typing via principal types. (English) Zbl 1275.68062

Barthe, Gilles (ed.), Programming languages and systems. 20th European symposium on programming, ESOP 2011, held as part of the joint European conferences on theory and practice of software, ETAPS 2011, Saarbrücken, Germany, March 26 – April 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19717-8/pbk). Lecture Notes in Computer Science 6602, 297-316 (2011).
MSC:  68N99 68P25
Full Text: DOI

Efficient techniques for high-speed elliptic curve cryptography. (English) Zbl 1297.94087

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 80-94 (2010).
MSC:  94A60 68P25 14G50
Full Text: DOI

Word oriented cascade jump \(\sigma \)-LFSR. (English) Zbl 1273.94363

Bras-Amorós, Maria (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 18th international symposium, AAECC-18, Tarragona, Sapin, June 8–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02180-0/pbk). Lecture Notes in Computer Science 5527, 127-136 (2009).
MSC:  94A60 94A55
Full Text: DOI

Tamper-tolerant software: modeling and implementation. (English) Zbl 1288.68061

Takagi, Tsuyoshi (ed.) et al., Advances in information and computer security. 4th international workshop on security, IWSEC 2009, Toyama, Japan, October 28–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04845-6/pbk). Lecture Notes in Computer Science 5824, 125-139 (2009).
MSC:  68P25 68N99
Full Text: DOI

Towards a type system for security APIs. (English) Zbl 1252.68110

Degano, Pierpaolo (ed.) et al., Foundations and applications of security analysis. Joint workshop on automated reasoning for security protocol analysis and issues in the theory of security, ARSPA-WITS 2009, York, UK, March 28–29, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03458-9/pbk). Lecture Notes in Computer Science 5511, 173-192 (2009).
MSC:  68P25 68N30

All secrets great and small. (English) Zbl 1234.68074

Castagna, Giuseppe (ed.), Programming languages and systems. 18th European symposium on programming, ESOP 2009, held as part of the joint European conferences on theory and practice of software, ETAPS 2009, York, UK, March 22–29, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00589-3/pbk). Lecture Notes in Computer Science 5502, 207-221 (2009).
MSC:  68N30 68P25
Full Text: DOI

Synthezising the \(F8\) cryptographic algorithm for programmable devices. (English) Zbl 1157.68368

Sahni, S. (ed.), Advances in computer science and technology. Proceedings of the 4th IASTED international conference (ACST 2008), Langkawi, Malaysia, April 2–4, 2008. Calgary: International Association of Science and Technology for Development (IASTED); Anaheim, CA: Acta Press (ISBN 978-0-88986-730-7/CD-ROM). 68-73 (2008).
MSC:  68P25

Ultra-lightweight implementations for smart devices – security for 1000 gate equivalents. (English) Zbl 1184.68243

Grimaud, Gilles (ed.) et al., Smart card research and advanced applications. 8th IFIP WG 8.8/11.2 international conference, CARDIS 2008, London, UK, September 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85892-8/pbk). Lecture Notes in Computer Science 5189, 89-103 (2008).
MSC:  68P25 68N99 94A60
Full Text: DOI

MD4 is not one-way. (English) Zbl 1154.68400

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 412-428 (2008).
MSC:  68P25 68N99 94A60
Full Text: DOI

Accelerating the whirlpool hash function using parallel table lookup and fast cyclical permutation. (English) Zbl 1154.68393

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 173-188 (2008).
MSC:  68P25 68N99 94A60
Full Text: DOI

SWIFFT: a modest proposal for FFT hashing. (English) Zbl 1154.68403

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 54-72 (2008).
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software