close
1.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
2.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
3.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
4.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼