標(biāo)題: Titlebook: Topics in Cryptology -- CT-RSA 2014; The Cryptographer‘s Josh Benaloh Conference proceedings 2014 Springer International Publishing Switze [打印本頁] 作者: irritants 時間: 2025-3-21 17:52
書目名稱Topics in Cryptology -- CT-RSA 2014影響因子(影響力)
書目名稱Topics in Cryptology -- CT-RSA 2014影響因子(影響力)學(xué)科排名
書目名稱Topics in Cryptology -- CT-RSA 2014網(wǎng)絡(luò)公開度
書目名稱Topics in Cryptology -- CT-RSA 2014網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Topics in Cryptology -- CT-RSA 2014被引頻次
書目名稱Topics in Cryptology -- CT-RSA 2014被引頻次學(xué)科排名
書目名稱Topics in Cryptology -- CT-RSA 2014年度引用
書目名稱Topics in Cryptology -- CT-RSA 2014年度引用學(xué)科排名
書目名稱Topics in Cryptology -- CT-RSA 2014讀者反饋
書目名稱Topics in Cryptology -- CT-RSA 2014讀者反饋學(xué)科排名
作者: Digest 時間: 2025-3-21 20:44 作者: 整理 時間: 2025-3-22 01:58
A Generic View on Trace-and-Revoke Broadcast Encryption Schemesold extractable hash proof systems. In particular, he gave instances of his generic revocation scheme from the DDH assumption (which led to the Naor-Pinkas revocation scheme), and from the factoring assumption (which led to a new revocation scheme). We expand on Wee’s work in two directions:.(a) We 作者: AVANT 時間: 2025-3-22 06:34
Broadcast Steganography with a dynamically designated set of receivers, so that the recipients recover the original content, while unauthorized users and outsiders remain . of the covert communication. One of our main technical contributions is the introduction of a new variant of anonymous broadcast encryption that we te作者: IRATE 時間: 2025-3-22 09:42
Practical Dual-Receiver Encryptionin one shot. We start by defining the crucial . property for DRE, which ensures that two recipients will get the same decryption result. While conceptually simple, DRE with soundness turns out to be a powerful primitive for various goals for PKE, such as complete non-malleability (CNM) and plaintext作者: insurrection 時間: 2025-3-22 16:33
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulationly used to generate secret keys, hereby exploiting the unique manufacturing variations of an IC. Unfortunately, PUF output bits are not perfectly reproducible and non-uniformly distributed. To obtain a high-quality key, one needs to implement additional post-processing logic on the same IC. Fuzzy ex作者: 放逐 時間: 2025-3-22 19:15
On Increasing the Throughput of Stream Ciphersing the throughput is to parallelize computations but this usually requires to insert additional memory cells for storing the intermediate results, hence at the expense of an increased hardware size..For stream ciphers with feedback shift registers (FSRs), we present an alternative approach for para作者: lipids 時間: 2025-3-22 21:19 作者: 審問,審訊 時間: 2025-3-23 02:27
On the Practical Security of a Leakage Resilient Masking Schemeack targets the manipulation of several, say ., intermediate variables then it is said to be a ..-order one. A privileged way to circumvent this type of attacks is to split any key-dependent variable into . shares, with .?>?., and to adapt the internal processing in order to securely operate on thes作者: 植物群 時間: 2025-3-23 07:19 作者: ABOUT 時間: 2025-3-23 12:37 作者: 不公開 時間: 2025-3-23 15:48
Automatic Search for Differential Trails in ARX Ciphersoriginally proposed for DES-like ciphers, to the class of ARX ciphers. To the best of our knowledge this is the first application of Matsui’s algorithm to ciphers that do not have S-boxes. The tool is applied to the block ciphers TEA, XTEA, SPECK and RAIDEN. For RAIDEN we find an iterative character作者: Formidable 時間: 2025-3-23 18:16 作者: collagen 時間: 2025-3-24 01:23 作者: Mediocre 時間: 2025-3-24 05:53
Group Signatures with Message-Dependent Opening in the Standard Model identify the origin of any signature if the need arises. In some applications, such a tracing capability can be excessively strong and it seems desirable to restrict the power of the authority. Sakai . recently suggested the notion of group signatures with message-dependent opening (GS-MDO), where 作者: 博愛家 時間: 2025-3-24 08:18 作者: 不能妥協(xié) 時間: 2025-3-24 11:02
Decentralized Traceable Attribute-Based Signaturestributed among different authorities rather than relying on a single central authority. By specializing our model to the single attribute authority setting, we overcome some of the shortcomings of the existing model for the same setting..Our second contribution is a generic construction for the prim作者: 精致 時間: 2025-3-24 18:06 作者: 色情 時間: 2025-3-24 22:42
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures a long time. Optimistic Fair Exchange (OFE) is an efficient solution to this problem, in which a semi-trusted third party named . is called in to resolve a dispute if there is one during an exchange between Alice and Bob. Recently, several extensions of OFE, such as Ambiguous OFE (AOFE) and Perfect作者: 6Applepolish 時間: 2025-3-24 23:12 作者: 神化怪物 時間: 2025-3-25 03:59
An Improved Compression Technique for Signatures Based on Learning with Errorstional assumptions. Our signatures are shorter than any previous proposal for provably-secure signatures based on standard lattice problems: at the 128-bit level we improve signature size from (more than) 16500 bits to around 9000 to 12000 bits.作者: 圓桶 時間: 2025-3-25 08:33 作者: Emasculate 時間: 2025-3-25 15:41
0302-9743 cal sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.978-3-319-04851-2978-3-319-04852-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 討好女人 時間: 2025-3-25 18:02
Practical Dual-Receiver Encryptions rely on random oracles or inefficient non-interactive zero-knowledge proofs. Finally, we investigate further applications or extensions of DRE, including DRE with CNM, combined use of DRE and PKE, strengthening two types of PKE schemes with plaintext equality test, off-the-record messaging with a stronger notion of deniability, etc.作者: Sciatica 時間: 2025-3-25 22:24
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulationmonstrate the latter construction to be vulnerable against manipulation of its public helper data. Full key recovery is possible, although depending on system design choices. We demonstrate our attacks using a 4-XOR arbiter PUF, manufactured in 65. CMOS technology. We also propose a simple but effective countermeasure.作者: diskitis 時間: 2025-3-26 00:24
Decentralized Traceable Attribute-Based Signaturesmework permits expressive signing polices. Finally, we provide some instantiations of the primitive whose security reduces to falsifiable intractability assumptions without relying on idealized assumptions.作者: 擴(kuò)音器 時間: 2025-3-26 07:13
0302-9743 CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cry作者: falsehood 時間: 2025-3-26 09:59 作者: alcohol-abuse 時間: 2025-3-26 16:39 作者: 爵士樂 時間: 2025-3-26 19:28
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes this yields a DCR-based revocation scheme..(b) We show that our EDDH-based revocation scheme allows for a mild form of traitor tracing (and, thus, yields a new trace-and-revoke scheme). In particular, compared to Wee’s factoring-based scheme, our DCR-based scheme has the advantage that it allows to trace traitors.作者: 賭博 時間: 2025-3-27 00:35
The Myth of Generic DPA…and the Magic of Learnings an example of such, and demonstrate its effectiveness in a variety of scenarios. We also give some evidence that its practical performance matches that of ‘best bit’ DoM attacks which we take as further indication for the necessity of performing profiled attacks in the context of device evaluations.作者: 情感脆弱 時間: 2025-3-27 04:26
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutationingle security assumption) rather than via idealization of multitude of algorithms, paddings and modes of operation. The protocol is also uniquely suitable for an autonomous or semi-autonomous hardware implementation of protocols where the secrets never leave the module, making it attractive for smart card and HSM designs.作者: recede 時間: 2025-3-27 08:19
Practical Distributed Signatures in the Standard Modelructures, where the participant set is divided into multiple disjoint groups, and each group is bounded so that a distributed signature cannot be generated unless a pre-defined number of participants from multiple groups work together.作者: ANTE 時間: 2025-3-27 13:20
velations’ of the ‘pitiless’ predation in nature (ibid., p. 118).. He describes how a hawk with a sparrow in its claws, got tangled in a sheet hung out to dry, but escaped with the smaller bird still shrieking in its clutches. He then tells of a long-tailed tit’s dome-shaped nest, ‘so secure and coz作者: 天文臺 時間: 2025-3-27 16:48
Armando Faz-Hernández,Patrick Longa,Ana H. Sánchez of the nineteenth century and its de-legitimizing rhetoric of an ‘Oriental’ pirate Other. Captivity tales about abduction and enslavement by Muslim ‘pirates’ like Royall Tyler’s . (1824) re-directed piracy from North Africa to North America, questioning the legitimacy of slavery at home and thus he作者: monogamy 時間: 2025-3-27 19:53
Dennis Hofheinz,Christoph Striecksder out of primordial chaos, new views have also discussed?its contents in relationship with the historical situation of the city of Ugarit in the tug-of-war between the Egyptian and Hittite empires in the Late Bronze Age. Recently, the interpersonal relationships of the gods in the story have also