close
1.

電子ブック

EB
EUROCRYPT 2005, Ronald Cramer, Takeo Kanade, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
2.

電子ブック

EB
Elisabeth Oswald, Takeo Kanade, Pankaj Rohatgi, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
3.

電子ブック

EB
Matthew Robshaw, Takeo Kanade, Matt J. B. Robshaw, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
4.

電子ブック

EB
Salil P. Vadhan, Takeo Kanade, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Encryption I
Does Privacy Require True Randomness? / Carl Bosley ; Yevgeniy Dodis
Tackling Adaptive Corruptions in Multicast Encryption Protocols / Saurabh Panjwani
Universally Composable Security
Long-Term Security and Universal Composability / Jorn Muller-Quade ; Dominique Unruh
Universally Composable Security with Global Setup / Ran Canetti ; Rafael Pass ; Shabsi Walfish
Arguments and Zero Knowledge
Parallel Repetition of Computationally Sound Protocols Revisited / Krzysztof Pietrzak ; Douglas Wikstrom
Lower Bounds for Non-interactive Zero-Knowledge / Hoeteck Wee
Perfect NIZK with Adaptive Soundness / Masayuki Abe ; Serge Fehr
Notions of Security
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries / Yonatan Aumann ; Yehuda Lindell
On the Necessity of Rewinding in Secure Multiparty Computation / Michael Backes
On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits / Oded Goldreich
Obfuscation
On Best-Possible Obfuscation / Shafi Goldwasser ; Guy N. Rothblum
Obfuscation for Cryptographic Purposes / Dennis Hofheinz ; John Malone-Lee ; Martijn Stam
Securely Obfuscating Re-encryption / Susan Hohenberger ; Abhi Shelat ; Vinod Vaikuntanathan
Secret Sharing and Multiparty Computation
Weakly-Private Secret Sharing Schemes / Amos Beimel ; Matthew Franklin
On Secret Sharing Schemes, Matroids and Polymatroids / Jaume Marti-Farre ; Carles Padro
Secure Linear Algebra Using Linearly Recurrent Sequences / Eike Kiltz ; Payman Mohassel ; Enav Weinreb
Towards Optimal and Efficient Perfectly Secure Message Transmission / Matthias Fitzi ; Juan Garay ; S. Harsha Vardhan
Signatures and Watermarking
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions / Carmit Hazay ; Jonathan Katz ; Chiu-Yuen Koo
Designated Confirmer Signatures Revisited
From Weak to Strong Watermarking / Nicholas Hopper ; David Molnar ; David Wagner
Private Approximation and Black-Box Reductions
Private Approximation of Clustering and Vertex Cover / Renen Hallak ; Kobbi Nissim
Robuster Combiners for Oblivious Transfer / Remo Meier ; Bartosz Przydatek ; Jurg Wullschleger
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
Towards a Separation of Semantic and CCA Security for Public Key Encryption / Yael Gertner ; Tal Malkin ; Steven Myers
Key Establishment
Unifying Classical and Quantum Key Distillation / Matthias Christandl ; Artur Ekert ; Michal Horodecki ; Pawel Horodecki ; Jonathan Oppenheim ; Renato Renner
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model / David Cash ; Yan Zong Ding ; Wenke Lee ; Richard Lipton
(Password) Authenticated Key Establishment: From 2-Party to Group / Michel Abdalla ; Jens-Matthias Bohli ; Maria Isabel Gonzalez Vasco ; Rainer Steinwandt
Encryption II
Multi-authority Attribute Based Encryption / Melissa Chase
Conjunctive, Subset, and Range Queries on Encrypted Data / Dan Boneh ; Brent Waters
How to Shuffle in Public / Ben Adida
Evaluating Branching Programs on Encrypted Data / Yuval Ishai ; Anat Paskin
Author Index
Encryption I
Does Privacy Require True Randomness? / Carl Bosley ; Yevgeniy Dodis
Tackling Adaptive Corruptions in Multicast Encryption Protocols / Saurabh Panjwani
5.

電子ブック

EB
International Conference on the Theory and Application of Cryptology and Information Security, Takeo Kanade, Bimal Roy, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
6.

電子ブック

EB
Moni Naor, David Hutchison, Takeo Kanade, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
7.

電子ブック

EB
Alfred Menezes, David Hutchison, Takeo Kanade, Alfred J. Menezes, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
8.

電子ブック

EB
Pascal Paillier, Takeo Kanade, Ingrid Verbauwhede, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
9.

電子ブック

EB
Cynthia Dwork, Takeo Kanade, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs / Elad Barkan ; Eli Biham ; Adi Shamir
On the Power of the Randomized Iterate / Iftach Haitner ; Danny Harnik ; Omer Reingold
Strengthening Digital Signatures Via Randomized Hashing / Shai Halevi ; Hugo Krawczyk
Round-Optimal Composable Blind Signatures in the Common Reference String Model / Marc Fischlin
On Signatures of Knowledge / Melissa Chase ; Anna Lysyanskaya
Non-interactive Zaps and New Techniques for NIZK / Jens Groth ; Rafail Ostrovsky ; Amit Sahai
Rankin's Constant and Blockwise Lattice Reduction / Nicolas Gama ; Nick Howgrave-Graham ; Henrik Koy ; Phong Q. Nguyen
Lattice-Based Cryptography / Oded Regev
A Method for Making Password-Based Key Exchange Resilient to Server Compromise / Craig Gentry ; Philip MacKenzie ; Zulfikar Ramzan
Mitigating Dictionary Attacks on Password-Protected Local Storage / Ran Canetti ; Michael Steiner
Rationality and Adversarial Behavior in Multi-party Computation / Nikos Triandopoulos
When Random Sampling Preserves Privacy / Kamalika Chaudhuri ; Nina Mishra
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models / Moni Naor ; Gil Segev ; Adam Smith
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets / Yevgeniy Dodis ; Jonathan Katz ; Leonid Reyzin
On Forward-Secure Storage / Stefan Dziembowski
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One / Rafael Pass ; Abhi Shelat ; Vinod Vaikuntanathan
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) / Xavier Boyen ; Brent Waters
Fast Algorithms for the Free Riders Problem in Broadcast Encryption / David P. Woodruff
The Number Field Sieve in the Medium Prime Case / Antoine Joux ; Reynald Lercier ; Nigel Smart ; Frederik Vercauteren
Inverting HFE Is Quasipolynomial / Louis Granboulan ; Jacques Stern
Cryptanalysis of 2R[superscript -] Schemes / Jean-Charles Faugere ; Ludovic Perret
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy / Tal Moran
Cryptographic Protocols for Electronic Voting / David Wagner
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission / Saurabh Agarwal ; Ronald Cramer ; Robbert de Haan
Random Selection with an Adversarial Majority / Ronen Gradwohl ; Salil Vadhan ; David Zuckerman
Oblivious Transfer and Linear Functions / Ivan B. Damgard ; Serge Fehr ; Louis Salvail ; Christian Schaffner
On Expected Constant-Round Protocols for Byzantine Agreement / Chiu-Yuen Koo
Robust Multiparty Computation with Linear Communication Complexity / Martin Hirt ; Jesper Buus Nielsen
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation / Yuval Ishai ; Eyal Kushilevitz ; Yehuda Lindell ; Erez Petrank
Scalable Secure Multiparty Computation / Ivan Damgard
Computations over Small Fields / Hao Chen
Automated Security Proofs with Sequences of Games / Bruno Blanchet ; David Pointcheval
On Robust Combiners for Private Information Retrieval and Other Primitives / Remo Meier ; Bartosz Przydatek
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions / Dan Boneh
On the Higher Order Nonlinearities of Algebraic Immune Functions / Claude Carlet
New Proofs for NMAC and HMAC: Security without Collision-Resistance / Mihir Bellare
Author Index
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs / Elad Barkan ; Eli Biham ; Adi Shamir
On the Power of the Randomized Iterate / Iftach Haitner ; Danny Harnik ; Omer Reingold
Strengthening Digital Signatures Via Randomized Hashing / Shai Halevi ; Hugo Krawczyk
10.

電子ブック

EB
FSE 2005, Henri Gilbert, Helena Handschuh, Takeo Kanade, International Association for Cryptologic Research.
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼