close
1.

電子ブック

EB
edited by Cetin Kaya Koc, Sihem Mesnager, Erkay Sava?
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9061
オンライン: http://dx.doi.org/10.1007/978-3-319-16277-5
目次情報: 続きを見る
First Invited talk
Computing Discrete Logarithms in F36?137 and F36?163 using Magma
Finite Field Arithmetic
Accelerating Iterative SpMV for the Discrete Logarithm Problem using GPUs
Finding Optimal Chudnovsky-Chudnovsky Multiplication Algorithms
Reducing the Complexity of Normal Basis Multiplication
O
Second Invited talk
Open Questions on Nonlinearity and on APN functions
Boolean and Vectorial Functions
Some Results on Difference Balanced Functions
Affine Equivalency and Nonlinearity Preserving Bijective Mappings over F2
On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions
On o-Equivalence of Niho Bent Functions
Third Invited Talk
L-polynomials of the curve yqn? y = xqh+1? _ over Fqm
Coding Theory and Code-based Cryptography
Efficient Software Implementations of Code-based Hash Functions
Quadratic residue codes over Fp + vFp + v2F.p
First Invited talk
Computing Discrete Logarithms in F36?137 and F36?163 using Magma
Finite Field Arithmetic
2.

電子ブック

EB
edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9084
オンライン: http://dx.doi.org/10.1007/978-3-319-18681-8
3.

電子ブック

EB
edited by Jens Groth
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9496
オンライン: http://dx.doi.org/10.1007/978-3-319-27239-9
目次情報: 続きを見る
Authentication
Symmetric cryptography
2-party computation
Codes
Boolean functions
Information theory
Leakage resilience
Authentication
Symmetric cryptography
2-party computation
4.

電子ブック

EB
edited by Jonathan Katz
出版情報: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 9020
オンライン: http://dx.doi.org/10.1007/978-3-662-46447-2
目次情報: 続きを見る
Public-Key Encryption
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
On the Selective Opening Security of Practical Public-Key Encryption Schemes
How Secure is Deterministic Encryption?
E-Cash
Divisible E-Cash Made Practical
Anonymous Transferable E-Cash
Cryptanalysis
Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
A Polynomial-Time Attack on the BBCRS Scheme
Algebraic Cryptanalysis of a Quantum Money Scheme: The Noise-Free Case
Digital Signatures
Digital Signatures from Strong RSA without Prime Generation
Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions
Tightly-Secure Signatures from Chameleon Hash Functions
Password-Based Authentication
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Pairing-Based Cryptography
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
Simpler Efficient Group Signatures from Lattices
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
Efficient Constructions
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
Additively Homomorphic UC Commitments with Optimal Amortized Overhead
Interactive Message-Locked Encryption and Secure Deduplication
Faster ECC over F2521_1
Cryptography with Imperfect Keys
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
A Tamper and Leakage Resilient von Neumann Architecture
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Interactive Proofs
Adaptive Proofs of Knowledge in the Random Oracle Model
Making Sigma-Protocols Non-interactive Without Random Oracles
Lattice-Based Cryptography
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q
Packing Messages and Optimizing Bootstrapping in GSW-FHE
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Identity-Based, Predicate, and Functional Encryption Simple Functional Encryption Schemes for Inner Products
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
On the Practical Security of Inner Product Functional Encryption
Identity-Based Encryption with (almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
Public-Key Encryption
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
On the Selective Opening Security of Practical Public-Key Encryption Schemes
5.

電子ブック

EB
edited by Dongdai Lin, Moti Yung, Jianying Zhou
出版情報: Cham : Springer International Publishing : Imprint: Springer, 2015
シリーズ名: Lecture Notes in Computer Science ; 8957
オンライン: http://dx.doi.org/10.1007/978-3-319-16745-9
目次情報: 続きを見る
An Efficient Privacy-Preserving E-coupon System
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications
Security of Direct Anonymous Authentication Using TPM 2.0 Signature
Revocation in Publicly Verifiable Outsourced Computation
Private Aggregation with Custom Collusion Tolerance
Ring Signatures of Constant Size Without Random Oracles
Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control
Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge
A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC
Optimal Proximity Proofs
Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions
Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization
Fully Homomorphic Encryption with Auxiliary Inputs
Trapdoors for Ideal Lattices with Applications
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails
The Boomerang Attacks on BLAKE and BLAKE2
Second Preimage Analysis of Whirlwind
Boomerang Attack on Step-Reduced SHA-512
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
Rig: A Simple, Secure and Flexible Design for Password Hashing
Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks
Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
A Note on Diem’s Proof
Stand-by Attacks on E-ID Password Authentication
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
A Lightweight Security Isolation Approach for Virtual Machines Deployment
A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors
An Efficient Privacy-Preserving E-coupon System
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications
Security of Direct Anonymous Authentication Using TPM 2.0 Signature