×

Found 587 Documents (Results 1–100)

Knowledge problems in security protocols: going beyond subterm convergent theories. (English) Zbl 07929345

Gaboardi, Marco (ed.) et al., 8th international conference on formal structures for computation and deduction, FSCD 2023, Rome, Italy, July 3–6, 2023. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 260, Article 30, 19 p. (2023).
MSC:  03B70 68Qxx
Full Text: DOI

Universally composable auditable surveillance. (English) Zbl 1543.94726

Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14439, 453-487 (2023).
MSC:  94A60 94A62 93C40
Full Text: DOI

Best of both worlds. Revisiting the spymasters double agent problem. (English) Zbl 1531.94021

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 328-359 (2023).
MSC:  94A60 68N20 68P25
Full Text: DOI

State machine replication under changing network conditions. (English) Zbl 1524.68010

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 681-710 (2023).
Full Text: DOI

Static vs. adaptive security in perfect MPC: a separation and the adaptive security of BGW. (English) Zbl 1542.94100

Dachman-Soled, Dana (ed.), 3rd conference on information-theoretic cryptography, ITC 2022, Cambridge, MA, USA, July 5–7, 2022. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 230, Article 15, 16 p. (2022).
MSC:  94A60 68P25 68M12
Full Text: DOI

Augmented random oracles. (English) Zbl 1517.94168

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 35-65 (2022).
MSC:  94A60
Full Text: DOI

Formalizing delayed adaptive corruptions and the security of flooding networks. (English) Zbl 1515.68087

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 400-430 (2022).

ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability. (English) Zbl 07628044

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 71-91 (2022).
MSC:  68M25 68P25 94A60
Full Text: DOI

Boosting the security of blind signature schemes. (English) Zbl 1514.94153

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13093, 468-492 (2021).
MSC:  94A62 94A60 68P25
Full Text: DOI

Environmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions. (English) Zbl 1509.94072

Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13042, 750-781 (2021).
MSC:  94A60 68P25 68M14
Full Text: DOI

Attestation waves: platform trust via remote power analysis. (English) Zbl 1498.68052

Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 460-482 (2021).
MSC:  68M25 68M12 94A62

Foundations for actively secure card-based cryptography. (English) Zbl 1516.94038

Farach-Colton, Martin (ed.) et al., 10th international conference on fun with algorithms. FUN 2021, May 30 – June 1, 2021, Favignana Island, Sicily, Italy. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 157, Article 17, 23 p. (2020).
MSC:  94A60 68Q10
Full Text: DOI

Pine: enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment. (English) Zbl 1524.68044

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 3-22 (2020).

A symbolic model for systematically analyzing TEE-based protocols. (English) Zbl 1511.68049

Meng, Weizhi (ed.) et al., Information and communications security. 22nd international conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12282, 126-144 (2020).
MSC:  68M25 68Q60 94A60
Full Text: DOI

Private set intersection in the internet setting from lightweight oblivious PRF. (English) Zbl 1504.94118

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 34-63 (2020).
MSC:  94A60 68M25 68M12
Full Text: DOI

Reverse firewalls for actively secure MPCs. (English) Zbl 1504.94117

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12171, 732-762 (2020).
MSC:  94A60 68P25 68M25
Full Text: DOI

Decidable inductive invariants for verification of cryptographic protocols with unbounded sessions. (English) Zbl 07559487

Konnov, Igor (ed.) et al., 31st international conference on concurrency theory. CONCUR 2020, September 1–4, 2020, Vienna, Austria, virtual conference. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 171, Article 31, 23 p. (2020).
MSC:  68Q85

An efficient secure division protocol using approximate multi-bit product and new constant-round building blocks. (English) Zbl 07314291

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 357-376 (2020).
MSC:  68M25 94A60
Full Text: DOI

There is always an exception: controlling partial information leakage in secure computation. (English) Zbl 1446.68025

Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 133-149 (2020).
MSC:  68M25 94A60
Full Text: DOI

Practical formal methods for real world cryptography (invited talk). (English) Zbl 1519.94053

Chattopadhyay, Arkadev (ed.) et al., 39th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2019, Bombay, India, December 11–13, 2019. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 150, Article 1, 12 p. (2019).
MSC:  94A60 68Q60 68T05
Full Text: DOI

Formalizing and proving privacy properties of voting protocols using alpha-beta privacy. (English) Zbl 1496.68136

Sako, Kazue (ed.) et al., Computer security – ESORICS 2019. 24th European symposium on research in computer security, Luxembourg, September 23–27, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11735, 535-555 (2019).
MSC:  68P27 94A60

Brief announcement: Multiparty interactive communication with private channels. (English) Zbl 1543.68025

Nowak, Thomas (ed.), Proceedings of the 38th ACM symposium on principles of distributed computing, PODC ’19, Toronto, ON, Canada, July 29 – August 2, 2019. New York, NY: Association for Computing Machinery (ACM). 147-149 (2019).
Full Text: DOI

A blind coupon mechanism enabling veto voting over unreliable networks. (English) Zbl 1453.68024

Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 250-270 (2019).
MSC:  68M25 68M12 94A60

On trees, chains and fast transactions in the blockchain. (English) Zbl 1454.94116

Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 327-351 (2019).
MSC:  94A62

Practical and provably secure onion routing. (English) Zbl 1499.68044

Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 144, 14 p. (2018).
MSC:  68M25 68M12 68P27

Analysing privacy-type properties in cryptographic protocols (invited talk). (English) Zbl 1462.68017

Kirchner, Hélène (ed.), 3rd international conference on formal structures for computation and deduction, FSCD 2018, July 9–12, 2018, Oxford, United Kingdom. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 108, Article 1, 21 p. (2018).
Full Text: DOI

Intercepting blackhole attacks in MANETs: an ASM-based model. (English) Zbl 1461.68047

Cerone, Antonio (ed.) et al., Software engineering and formal methods. SEFM 2017 collocated workshops: DataMod, FAACS, MSE, CoSim-CPS, and FOCLASA, Trento, Italy, September 4–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10729, 137-152 (2018).
MSC:  68M25 68M12
Full Text: DOI

TinyKeys: a new approach to efficient multi-party computation. (English) Zbl 1446.94135

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10993, 3-33 (2018).
MSC:  94A60

DC programming and DCA for enhancing physical layer security in amplify-and-forward relay beamforming networks based on the SNR approach. (English) Zbl 1429.68024

Le, Nguyen-Thinh (ed.) et al., Advanced computational methods for knowledge engineering. Proceedings of the 5th international conference on computer science, applied mathematics and applications, ICCSAMA 2017, Berlin, Germany, June 30 – July 1, 2017. Cham: Springer. Adv. Intell. Syst. Comput. 629, 23-33 (2018).
MSC:  68M12 94A60
Full Text: DOI

Secret key amplification from uniformly leaked key exchange complete graph. (English) Zbl 1498.68058

Rahman, M. Sohel (ed.) et al., WALCOM: algorithms and computation. 12th international conference, WALCOM 2018, Dhaka, Bangladesh, March 3–5, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10755, 20-31 (2018).
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software