default search action
8. SCN 2012: Amalfi, Italy
- Ivan Visconti, Roberto De Prisco:
Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings. Lecture Notes in Computer Science 7485, Springer 2012, ISBN 978-3-642-32927-2
Cryptography from Lattices
- Xiang Xie, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. 1-18 - Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart:
Ring Switching in BGV-Style Homomorphic Encryption. 19-37 - Ivan Damgård, Adriana López-Alt:
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions. 38-56 - Jan Camenisch, Gregory Neven, Markus Rückert:
Fully Anonymous Attribute Tokens from Lattices. 57-75
Signature Schemes
- Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev:
Efficient Structure-Preserving Signature Scheme from Standard Assumptions. 76-94 - Olivier Blazy, David Pointcheval, Damien Vergnaud:
Compact Round-Optimal Partially-Blind Signatures. 95-112 - Marc Fischlin, Anja Lehmann, Dominique Schröder:
History-Free Sequential Aggregate Signatures. 113-130 - Melissa Chase, Markulf Kohlweiss:
A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN. 131-148
Encryption Schemes I
- Steven A. Myers, Mona Sergi, Abhi Shelat:
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness. 149-165 - Duong Hieu Phan, David Pointcheval, Mario Strefler:
Decentralized Dynamic Broadcast Encryption. 166-183 - Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai:
Time-Specific Encryption from Forward-Secure Encryption. 184-204
Efficient Two-Party and Multi-Party Computation
- Vladimir Kolesnikov, Ranjit Kumaresan:
Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits. 205-221 - Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler:
5PM: Secure Pattern Matching. 222-240 - Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart:
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol. 241-263
Security in the UC Framework
- Seung Geol Choi, Dana Dachman-Soled, Moti Yung:
On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. 264-280 - Ran Canetti, Margarita Vald:
Universally Composable Security with Local Adversaries. 281-301
Cryptanalysis
- Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu:
On the Strength Comparison of the ECDLP and the IFP. 302-325 - Gottfried Herold, Alexander Meurer:
New Attacks for Knapsack Based Cryptosystems. 326-342 - Céline Blondeau, Benoît Gérard, Kaisa Nyberg:
Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics. 343-360 - Enrico Thomae:
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings. 361-373
Encryption Schemes II
- Guilhem Castagnos, Fabien Laguillaumie:
Homomorphic Encryption for Multiplications and Pairing Evaluation. 374-392 - Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. 393-410 - Kenji Yasunaga:
Public-Key Encryption with Lazy Parties. 411-425
Efficient Constructions
- Ching-Hua Yu, Bo-Yin Yang:
Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation. 426-444 - Vladimir Kolesnikov:
MAC Aggregation with Message Multiplicity. 445-460 - Björn Terelius, Douglas Wikström:
Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited. 461-476 - Helger Lipmaa, Bingsheng Zhang:
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument. 477-502
Protocols and Combiners
- Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
Active Security in Multiparty Computation over Black-Box Groups. 503-521 - Arno Mittelbach:
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output. 522-539 - Stelios Erotokritou, Yvo Desmedt:
Human Perfectly Secure Message Transmission Protocols and Their Applications. 540-558 - Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven:
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. 559-579
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.