首页 > 最新文献

The Cryptographer's Track at RSA Conference最新文献

英文 中文
Regularly Lossy Functions and Applications 常规有损函数和应用
Pub Date : 2018-04-16 DOI: 10.1007/978-3-319-76953-0_26
Yu Chen, Baodong Qin, Haiyang Xue
{"title":"Regularly Lossy Functions and Applications","authors":"Yu Chen, Baodong Qin, Haiyang Xue","doi":"10.1007/978-3-319-76953-0_26","DOIUrl":"https://doi.org/10.1007/978-3-319-76953-0_26","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117213797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved Security Bound of LightMAC_Plus and Its Single-Key Variant 改进的LightMAC_Plus及其单密钥变体安全界
Pub Date : 2018-04-16 DOI: 10.1007/978-3-319-76953-0_16
Yusuke Naito
{"title":"Improved Security Bound of LightMAC_Plus and Its Single-Key Variant","authors":"Yusuke Naito","doi":"10.1007/978-3-319-76953-0_16","DOIUrl":"https://doi.org/10.1007/978-3-319-76953-0_16","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Practical Revocation and Key Rotation 实际撤销和密钥轮换
Pub Date : 2018-04-16 DOI: 10.1007/978-3-319-76953-0_9
Steven Myers, Adam Shull
{"title":"Practical Revocation and Key Rotation","authors":"Steven Myers, Adam Shull","doi":"10.1007/978-3-319-76953-0_9","DOIUrl":"https://doi.org/10.1007/978-3-319-76953-0_9","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130025786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability 为什么开发者Johnny不能使用公钥证书——OpenSSL可用性的实验研究
Pub Date : 2018-04-16 DOI: 10.1007/978-3-319-76953-0_3
Martin Ukrop, Vashek Matyás
{"title":"Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability","authors":"Martin Ukrop, Vashek Matyás","doi":"10.1007/978-3-319-76953-0_3","DOIUrl":"https://doi.org/10.1007/978-3-319-76953-0_3","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126785250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Count-then-Permute: A Precision-Free Alternative to Inversion Sampling 计数-然后置换:一种精度自由替代反演采样
Pub Date : 2018-04-16 DOI: 10.1007/978-3-319-76953-0_14
Kazuhiko Minematsu, Kentarou Sasaki, Yuki Tanaka
{"title":"Count-then-Permute: A Precision-Free Alternative to Inversion Sampling","authors":"Kazuhiko Minematsu, Kentarou Sasaki, Yuki Tanaka","doi":"10.1007/978-3-319-76953-0_14","DOIUrl":"https://doi.org/10.1007/978-3-319-76953-0_14","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131755162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX MemJam:针对SGX中恒定时间加密实现的虚假依赖攻击
Pub Date : 2018-04-16 DOI: 10.1007/978-3-319-76953-0_2
A. Moghimi, T. Eisenbarth, B. Sunar
{"title":"MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX","authors":"A. Moghimi, T. Eisenbarth, B. Sunar","doi":"10.1007/978-3-319-76953-0_2","DOIUrl":"https://doi.org/10.1007/978-3-319-76953-0_2","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"49 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115241869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Surnaming Schemes, Fast Verification, and Applications to SGX Technology 命名方案、快速验证和SGX技术的应用
Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_9
D. Boneh, S. Gueron
{"title":"Surnaming Schemes, Fast Verification, and Applications to SGX Technology","authors":"D. Boneh, S. Gueron","doi":"10.1007/978-3-319-52153-4_9","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_9","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123484763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption 重新审视全prf安全PMAC并将其用于过生日认证加密
Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_15
Eik List, M. Nandi
{"title":"Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption","authors":"Eik List, M. Nandi","doi":"10.1007/978-3-319-52153-4_15","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_15","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130112042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Low-Leakage Secure Search for Boolean Expressions 布尔表达式的低泄漏安全搜索
Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_23
Fernando Krell, Gabriela F. Cretu-Ciocarlie, Ashish Gehani, Mariana Raykova
{"title":"Low-Leakage Secure Search for Boolean Expressions","authors":"Fernando Krell, Gabriela F. Cretu-Ciocarlie, Ashish Gehani, Mariana Raykova","doi":"10.1007/978-3-319-52153-4_23","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_23","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"5 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131437895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin 发布或消亡:对比特币自私挖矿的向后兼容防御
Pub Date : 2017-02-14 DOI: 10.1007/978-3-319-52153-4_16
Ren Zhang, B. Preneel
{"title":"Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin","authors":"Ren Zhang, B. Preneel","doi":"10.1007/978-3-319-52153-4_16","DOIUrl":"https://doi.org/10.1007/978-3-319-52153-4_16","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122143066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
期刊
The Cryptographer's Track at RSA Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1