


default search action
8. SCN 2012: Amalfi, Italy
- Ivan Visconti, Roberto De Prisco

:
Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings. Lecture Notes in Computer Science 7485, Springer 2012, ISBN 978-3-642-32927-2
Cryptography from Lattices
- Xiang Xie

, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. 1-18 - Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart:

Ring Switching in BGV-Style Homomorphic Encryption. 19-37 - Ivan Damgård, Adriana López-Alt:

Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions. 38-56 - Jan Camenisch, Gregory Neven, Markus Rückert:

Fully Anonymous Attribute Tokens from Lattices. 57-75
Signature Schemes
- Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev:

Efficient Structure-Preserving Signature Scheme from Standard Assumptions. 76-94 - Olivier Blazy

, David Pointcheval
, Damien Vergnaud
:
Compact Round-Optimal Partially-Blind Signatures. 95-112 - Marc Fischlin, Anja Lehmann, Dominique Schröder

:
History-Free Sequential Aggregate Signatures. 113-130 - Melissa Chase, Markulf Kohlweiss

:
A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN. 131-148
Encryption Schemes I
- Steven A. Myers, Mona Sergi, Abhi Shelat:

Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness. 149-165 - Duong Hieu Phan

, David Pointcheval
, Mario Strefler:
Decentralized Dynamic Broadcast Encryption. 166-183 - Kohei Kasamatsu, Takahiro Matsuda, Keita Emura

, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai:
Time-Specific Encryption from Forward-Secure Encryption. 184-204
Efficient Two-Party and Multi-Party Computation
- Vladimir Kolesnikov, Ranjit Kumaresan:

Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits. 205-221 - Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler:

5PM: Secure Pattern Matching. 222-240 - Ivan Damgård, Marcel Keller, Enrique Larraia

, Christian Miles, Nigel P. Smart:
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol. 241-263
Security in the UC Framework
- Seung Geol Choi, Dana Dachman-Soled, Moti Yung:

On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. 264-280 - Ran Canetti, Margarita Vald:

Universally Composable Security with Local Adversaries. 281-301
Cryptanalysis
- Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu:

On the Strength Comparison of the ECDLP and the IFP. 302-325 - Gottfried Herold, Alexander Meurer:

New Attacks for Knapsack Based Cryptosystems. 326-342 - Céline Blondeau, Benoît Gérard, Kaisa Nyberg:

Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics. 343-360 - Enrico Thomae:

Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings. 361-373
Encryption Schemes II
- Guilhem Castagnos, Fabien Laguillaumie:

Homomorphic Encryption for Multiplications and Pairing Evaluation. 374-392 - Juan Manuel González Nieto, Mark Manulis

, Bertram Poettering, Jothi Rangasamy
, Douglas Stebila
:
Publicly Verifiable Ciphertexts. 393-410 - Kenji Yasunaga:

Public-Key Encryption with Lazy Parties. 411-425
Efficient Constructions
- Ching-Hua Yu, Bo-Yin Yang:

Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation. 426-444 - Vladimir Kolesnikov:

MAC Aggregation with Message Multiplicity. 445-460 - Björn Terelius, Douglas Wikström:

Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited. 461-476 - Helger Lipmaa

, Bingsheng Zhang:
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument. 477-502
Protocols and Combiners
- Yvo Desmedt, Josef Pieprzyk

, Ron Steinfeld:
Active Security in Multiparty Computation over Black-Box Groups. 503-521 - Arno Mittelbach:

Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output. 522-539 - Stelios Erotokritou, Yvo Desmedt:

Human Perfectly Secure Message Transmission Protocols and Their Applications. 540-558 - Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven:

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. 559-579

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














