首页 > 最新文献

International Conference on the Theory and Application of Cryptographic Techniques最新文献

英文 中文
Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT 改进线性攻击中的密钥恢复:应用于28轮PRESENT
Pub Date : 2020-05-10 DOI: 10.1007/978-3-030-45721-1_9
Antonio Flórez-Gutiérrez, M. Naya-Plasencia
{"title":"Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT","authors":"Antonio Flórez-Gutiérrez, M. Naya-Plasencia","doi":"10.1007/978-3-030-45721-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-45721-1_9","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation 利用故障传播的块密码故障模板攻击
Pub Date : 2020-05-10 DOI: 10.1007/978-3-030-45721-1_22
Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay
{"title":"Fault Template Attacks on Block Ciphers Exploiting Fault Propagation","authors":"Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay","doi":"10.1007/978-3-030-45721-1_22","DOIUrl":"https://doi.org/10.1007/978-3-030-45721-1_22","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations 龙卷风:自动生成探测安全掩码位切片实现
Pub Date : 2020-05-10 DOI: 10.1007/978-3-030-45727-3_11
Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
{"title":"Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations","authors":"Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff","doi":"10.1007/978-3-030-45727-3_11","DOIUrl":"https://doi.org/10.1007/978-3-030-45727-3_11","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Tight Security Bounds for Double-Block Hash-then-Sum MACs 双块Hash-then-Sum mac的严格安全边界
Pub Date : 2020-05-10 DOI: 10.1007/978-3-030-45721-1_16
Seong-Hak Kim, ByeongHak Lee, Jooyoung Lee
{"title":"Tight Security Bounds for Double-Block Hash-then-Sum MACs","authors":"Seong-Hak Kim, ByeongHak Lee, Jooyoung Lee","doi":"10.1007/978-3-030-45721-1_16","DOIUrl":"https://doi.org/10.1007/978-3-030-45721-1_16","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133274421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Classical Proofs of Quantum Knowledge 量子知识的经典证明
Pub Date : 2020-05-04 DOI: 10.1007/978-3-030-77886-6_22
Thomas Vidick, Tina Zhang
{"title":"Classical Proofs of Quantum Knowledge","authors":"Thomas Vidick, Tina Zhang","doi":"10.1007/978-3-030-77886-6_22","DOIUrl":"https://doi.org/10.1007/978-3-030-77886-6_22","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128125411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Continuous Non-Malleable Codes in the 8-Split-State Model 8分裂状态模型中的连续非延展性码
Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17653-2_18
Divesh Aggarwal, Nico Döttling, J. Nielsen, Maciej Obremski, Erick Purwanto
{"title":"Continuous Non-Malleable Codes in the 8-Split-State Model","authors":"Divesh Aggarwal, Nico Döttling, J. Nielsen, Maciej Obremski, Erick Purwanto","doi":"10.1007/978-3-030-17653-2_18","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_18","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Computationally Volume-Hiding Structured Encryption 计算卷隐藏结构化加密
Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17656-3_7
S. Kamara, Tarik Moataz
{"title":"Computationally Volume-Hiding Structured Encryption","authors":"S. Kamara, Tarik Moataz","doi":"10.1007/978-3-030-17656-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-17656-3_7","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129616668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
How to Leverage Hardness of Constant-Degree Expanding Polynomials over mathbb R R to build i풪 i O 如何利用在mathbb R R上的常度展开多项式的硬度来构建i풪i O
Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17653-2_9
Aayush Jain, Huijia Lin, Christian Matt, A. Sahai
{"title":"How to Leverage Hardness of Constant-Degree Expanding Polynomials over mathbb R R to build i풪 i O","authors":"Aayush Jain, Huijia Lin, Christian Matt, A. Sahai","doi":"10.1007/978-3-030-17653-2_9","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_9","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114400616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Compact Adaptively Secure ABE for mathsf NC^1 from k-Lin 基于k-Lin的mathsf NC^1的紧凑自适应安全ABE
Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17653-2_1
Lucas Kowalczyk, H. Wee
{"title":"Compact Adaptively Secure ABE for mathsf NC^1 from k-Lin","authors":"Lucas Kowalczyk, H. Wee","doi":"10.1007/978-3-030-17653-2_1","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_1","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Symbolic Encryption with Pseudorandom Keys 伪随机密钥的符号加密
Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-17659-4_3
Daniele Micciancio
{"title":"Symbolic Encryption with Pseudorandom Keys","authors":"Daniele Micciancio","doi":"10.1007/978-3-030-17659-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-17659-4_3","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"66 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120840611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Conference on the Theory and Application of Cryptographic Techniques
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1