top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in cryptology - asiacrypt 2007 : 13th international conference on the theory and application of cryptology and information security, kuching, malaysia, december 2-6, 2007, proceedings / / edited by Kaoru Kurosawa
Advances in cryptology - asiacrypt 2007 : 13th international conference on the theory and application of cryptology and information security, kuching, malaysia, december 2-6, 2007, proceedings / / edited by Kaoru Kurosawa
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 583 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Cryptography
ISBN 3-540-76900-5
Classificazione 510
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Number Theory and Elliptic Curve -- A Kilobit Special Number Field Sieve Factorization -- When e-th Roots Become Easier Than Factoring -- Faster Addition and Doubling on Elliptic Curves -- Protocol -- A Non-interactive Shuffle with Pairing Based Verifiability -- On Privacy Models for RFID -- Invited Talk I -- Obtaining Universally Compoable Security: Towards the Bare Bones of Trust -- A Simple Variant of the Merkle-Damgård Scheme with a Permutation -- Seven-Property-Preserving Iterated Hashing: ROX -- How to Build a Hash Function from Any Collision-Resistant Function -- Fully Anonymous Group Signatures Without Random Oracles -- Group Encryption -- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys -- Boosting Merkle-Damgård Hashing for Message Authentication -- On Efficient Message Authentication Via Block Cipher Design Techniques -- Symmetric Key Cryptography on Modern Graphics Hardware -- Multiparty Computation I -- Blind Identity-Based Encryption and Simulatable Oblivious Transfer -- Multi-party Indirect Indexing and Applications -- Two-Party Computing with Encrypted Data -- Known-Key Distinguishers for Some Block Ciphers -- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions -- On Tweaking Luby-Rackoff Blockciphers -- Multiparty Computation II -- Secure Protocols with Asymmetric Trust -- Simple and Efficient Perfectly-Secure Asynchronous MPC -- Efficient Byzantine Agreement with Faulty Minority -- Information-Theoretic Security Without an Honest Majority -- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations -- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions -- Anonymous Quantum Communication -- Invited Talk II -- Authenticated Key Exchange and Key Encapsulation in the Standard Model -- Miniature CCA2 PK Encryption: Tight Security Without Redundancy -- Bounded CCA2-Secure Encryption -- Relations Among Notions of Non-malleability for Encryption -- Cryptanalysis of the Tiger Hash Function -- Cryptanalysis of Grindahl -- A Key Recovery Attack on Edon80.
Record Nr. UNINA-9910483450203321
Berlin, Germany : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology - asiacrypt 2007 : 13th international conference on the theory and application of cryptology and information security, kuching, malaysia, december 2-6, 2007, proceedings / / edited by Kaoru Kurosawa
Advances in cryptology - asiacrypt 2007 : 13th international conference on the theory and application of cryptology and information security, kuching, malaysia, december 2-6, 2007, proceedings / / edited by Kaoru Kurosawa
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 583 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Cryptography
ISBN 3-540-76900-5
Classificazione 510
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Number Theory and Elliptic Curve -- A Kilobit Special Number Field Sieve Factorization -- When e-th Roots Become Easier Than Factoring -- Faster Addition and Doubling on Elliptic Curves -- Protocol -- A Non-interactive Shuffle with Pairing Based Verifiability -- On Privacy Models for RFID -- Invited Talk I -- Obtaining Universally Compoable Security: Towards the Bare Bones of Trust -- A Simple Variant of the Merkle-Damgård Scheme with a Permutation -- Seven-Property-Preserving Iterated Hashing: ROX -- How to Build a Hash Function from Any Collision-Resistant Function -- Fully Anonymous Group Signatures Without Random Oracles -- Group Encryption -- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys -- Boosting Merkle-Damgård Hashing for Message Authentication -- On Efficient Message Authentication Via Block Cipher Design Techniques -- Symmetric Key Cryptography on Modern Graphics Hardware -- Multiparty Computation I -- Blind Identity-Based Encryption and Simulatable Oblivious Transfer -- Multi-party Indirect Indexing and Applications -- Two-Party Computing with Encrypted Data -- Known-Key Distinguishers for Some Block Ciphers -- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions -- On Tweaking Luby-Rackoff Blockciphers -- Multiparty Computation II -- Secure Protocols with Asymmetric Trust -- Simple and Efficient Perfectly-Secure Asynchronous MPC -- Efficient Byzantine Agreement with Faulty Minority -- Information-Theoretic Security Without an Honest Majority -- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations -- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions -- Anonymous Quantum Communication -- Invited Talk II -- Authenticated Key Exchange and Key Encapsulation in the Standard Model -- Miniature CCA2 PK Encryption: Tight Security Without Redundancy -- Bounded CCA2-Secure Encryption -- Relations Among Notions of Non-malleability for Encryption -- Cryptanalysis of the Tiger Hash Function -- Cryptanalysis of Grindahl -- A Key Recovery Attack on Edon80.
Record Nr. UNISA-996465496803316
Berlin, Germany : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Theoretic Security [[electronic resource] ] : 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers / / edited by Kaoru Kurosawa
Information Theoretic Security [[electronic resource] ] : 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers / / edited by Kaoru Kurosawa
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 249 p. 23 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer security
Algorithms
Computer communication systems
Management information systems
Computer science
Cryptology
Coding and Information Theory
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
ISBN 1-280-38803-X
9786613565952
3-642-14496-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Leakage Resilient Cryptography -- Survey: Leakage Resilience and the Bounded Retrieval Model -- A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes -- Quantum Cryptography and Indistinguishability -- Security of Key Distribution and Complementarity in Quantum Mechanics -- Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification -- Connection to Computational Security -- Code-Based Public-Key Cryptosystems and Their Applications -- On the Security of Pseudorandomized Information-Theoretically Secure Schemes -- Secret Sharing -- Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience -- On the Optimization of Bipartite Secret Sharing Schemes -- Linear Threshold Multisecret Sharing Schemes -- Key Agreement from Common Randomness -- Multiterminal Secrecy Generation and Tree Packing -- Information Theoretic Security Based on Bounded Observability -- Random Graph and Group Testing -- Group Testing and Batch Verification -- Reliable Data Transmision and Computation -- What Can Cryptography Do for Coding Theory? -- Cryptanalysis of Secure Message Transmission Protocols with Feedback -- The Optimum Leakage Principle for Analyzing Multi-threaded Programs -- Fingerprint and Watermarking -- A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure -- An Improvement of Pseudorandomization against Unbounded Attack Algorithms – The Case of Fingerprint Codes -- Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading.
Record Nr. UNISA-996465920403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information theoretic security : 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009 : revised selected papers / / Kaoru Kurosawa (ed.)
Information theoretic security : 4th international conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009 : revised selected papers / / Kaoru Kurosawa (ed.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (X, 249 p. 23 illus.)
Disciplina 005.8
Altri autori (Persone) KurosawaKaoru
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Cryptography
Data encryption (Computer science)
Data protection
ISBN 1-280-38803-X
9786613565952
3-642-14496-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Leakage Resilient Cryptography -- Survey: Leakage Resilience and the Bounded Retrieval Model -- A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes -- Quantum Cryptography and Indistinguishability -- Security of Key Distribution and Complementarity in Quantum Mechanics -- Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification -- Connection to Computational Security -- Code-Based Public-Key Cryptosystems and Their Applications -- On the Security of Pseudorandomized Information-Theoretically Secure Schemes -- Secret Sharing -- Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience -- On the Optimization of Bipartite Secret Sharing Schemes -- Linear Threshold Multisecret Sharing Schemes -- Key Agreement from Common Randomness -- Multiterminal Secrecy Generation and Tree Packing -- Information Theoretic Security Based on Bounded Observability -- Random Graph and Group Testing -- Group Testing and Batch Verification -- Reliable Data Transmision and Computation -- What Can Cryptography Do for Coding Theory? -- Cryptanalysis of Secure Message Transmission Protocols with Feedback -- The Optimum Leakage Principle for Analyzing Multi-threaded Programs -- Fingerprint and Watermarking -- A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure -- An Improvement of Pseudorandomization against Unbounded Attack Algorithms – The Case of Fingerprint Codes -- Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading.
Altri titoli varianti ICITS 2009
Record Nr. UNINA-9910483803903321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the ACM Workshop on Digital Rights Management
Proceedings of the ACM Workshop on Digital Rights Management
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2006
Descrizione fisica 1 online resource (106 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the Association for Computing Machinery Workshop on Digital Rights Management
Record Nr. UNINA-9910376495103321
[Place of publication not identified], : ACM, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings / / edited by Kaoru Kurosawa
Provable Security [[electronic resource] ] : 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings / / edited by Kaoru Kurosawa
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 279 p. 26 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
User interfaces (Computer systems)
Computer communication systems
Management information systems
Computer science
Algorithms
Computer security
Cryptology
User Interfaces and Human Computer Interaction
Computer Communication Networks
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Soggetto genere / forma Conference proceedings.
ISBN 1-280-38969-9
9786613567611
3-642-16280-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Identification -- Improved Zero-Knowledge Identification with Lattices -- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks -- Auto Proofs -- A Calculus for Game-Based Security Proofs -- Automating Computational Proofs for Public-Key-Based Key Exchange -- Signature I -- A Framework for Constructing Convertible Undeniable Signatures -- Efficient Confirmer Signatures from the “Signature of a Commitment” Paradigm -- Hash Function -- Collision Resistant Double-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis of Soundness of Several Shuffling Schemes -- Distinguishing Distributions Using Chernoff Information -- Signature II -- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) -- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation -- Invited Talk -- Cryptographic Protocols from Lattices -- Encryption -- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication -- Efficient Broadcast Encryption with Personalized Messages -- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption -- Signcryption -- Identity Based Public Verifiable Signcryption Scheme -- Fully Secure Threshold Unsigncryption.
Record Nr. UNISA-996465825203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-Key Cryptography -- PKC 2013 [[electronic resource] ] : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 -- March 1, 2013, Proceedings / / edited by Kaoru Kurosawa, Goichiro Hanaoka
Public-Key Cryptography -- PKC 2013 [[electronic resource] ] : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 -- March 1, 2013, Proceedings / / edited by Kaoru Kurosawa, Goichiro Hanaoka
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 518 p. 46 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
E-commerce
Application software
Cryptology
Systems and Data Security
Coding and Information Theory
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36362-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Record Nr. UNISA-996466237803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-Key Cryptography -- PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 -- March 1, 2013, Proceedings / / edited by Kaoru Kurosawa, Goichiro Hanaoka
Public-Key Cryptography -- PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 -- March 1, 2013, Proceedings / / edited by Kaoru Kurosawa, Goichiro Hanaoka
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 518 p. 46 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
E-commerce
Application software
Cryptology
Systems and Data Security
Coding and Information Theory
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36362-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Record Nr. UNINA-9910484384903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui