zbmath.org

Document Zbl 1116.94001 - zbMATH Open

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1102.94003).
Indexed articles:
Boyen, Xavier; Waters, Brent, Full-domain subgroup hiding and constant-size group signatures, 1-15 [Zbl 1127.94020]
Ge, He; Tate, Stephen R., A direct anonymous attestation scheme for embedded devices, 16-30 [Zbl 1127.94025]
Fischlin, Marc, Anonymous signatures made easy, 31-42 [Zbl 1127.94023]
Wang, Guilin; Baek, Joonsang; Wong, Duncan S.; Bao, Feng, On the generic and efficient constructions of secure designated confirmer signatures, 43-60 [Zbl 1127.94028]
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz, Cryptanalysis of group-based key agreement protocols using subgroup distance functions, 61-75 [Zbl 1127.94026]
Myasnikov, Alex D.; Ushakov, Alexander, Length based attack and braid groups: cryptanalysis of Anshel-Anshel-Goldfeld key exchange protocol, 76-88 [Zbl 1127.94017]
Gama, Nicolas; Nguyen, Phong Q., New chosen-ciphertext attacks on NTR, 89-106 [Zbl 1127.94014]
Han, Daewan; Kim, Myung-Hwan; Yeom, Yongjin, Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003, 107-117 [Zbl 1127.94015]
Dodis, Yevgeniy; Lee, Pil Joong; Yum, Dae Hyun, Optimistic fair exchange in a multi-user setting, 118-133 [Zbl 1127.94345]
Zhu, Huafei; Susilo, Willy; Mu, Yi, Multi-party stand-alone and setup-free verifiably committed signatures, 134-149 [Zbl 1127.94381]
Buldas, Ahto; Laur, Sven, Knowledge-binding commitments with applications in time-stamping, 150-165 [Zbl 1127.94012]
Shacham, Hovav; Waters, Brent, Efficient ring signatures without random oracles, 166-180 [Zbl 1127.94027]
Fujisaki, Eiichiro; Suzuki, Koutarou, Traceable ring signature, 181-200 [Zbl 1127.94024]
Bellare, Mihir; Shoup, Sarah, Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles, 201-216 [Zbl 1127.94019]
Bresson, Emmanuel; Catalano, Dario; Gennaro, Rosario, Improved on-line/off-line threshold signatures, 217-232 [Zbl 1127.94021]
Ding, Jintai; Hu, Lei; Nie, Xuyun; Li, Jianyu; Wagner, John, High order linearization equation (hole) attack on multivariate public key cryptosystems, 233-248 [Zbl 1161.94395]
Dubois, Vivien; Granboulan, Louis; Stern, Jacques, Cryptanalysis of HFE with internal perturbation, 249-265 [Zbl 1127.94022]
Ding, Jintai; Wolf, Christopher; Yang, Bo-Yin, \(\ell \)-invertible cycles for Multivariate Quadratic (MQ) public key cryptography, 266-281 [Zbl 1161.94006]
Kiltz, Eike, Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman, 282-297 [Zbl 1127.94016]
Libert, Benoît; Quisquater, Jean-Jacques; Yung, Moti, Parallel key-insulated public key encryption without random oracles, 298-314 [Zbl 1161.94415]
Kawachi, Akinori; Tanaka, Keisuke; Xagawa, Keita, Multi-bit cryptosystems based on lattice problems, 315-329 [Zbl 1161.94411]
Garay, Juan; Schoenmakers, Berry; Villegas, José, Practical and secure solutions for integer comparison, 330-342 [Zbl 1161.94399]
Nishide, Takashi; Ohta, Kazuo, Multiparty computation for interval, equality, and comparison without bit-decomposition protocol, 343-360 [Zbl 1161.94422]
Abdalla, Michel; Dent, Alexander W.; Malone-Lee, John; Neven, Gregory; Phan, Duong Hieu; Smart, Nigel P., Identity-based traitor tracing, 361-376 [Zbl 1127.94010]
Groth, Jens; Lu, Steve, Verifiable shuffle of large size ciphertexts, 377-392 [Zbl 1161.94401]
Ostrovsky, Rafail; Skeith, William E. III, A survey of single-database private information retrieval: techniques and applications, 393-411 [Zbl 1161.68435]
Kunihiro, Noboru; Kurosawa, Kaoru, Deterministic polynomial time equivalence between factoring and key-recovery attack on Takagi’s RSA, 412-425 [Zbl 1161.94412]
Farashahi, Reza Rezaeian; Schoenmakers, Berry; Sidorenko, Andrey, Efficient pseudorandom generators based on the DDH assumption, 426-441 [Zbl 1161.65305]
Cheon, Jung Hee; Yi, Jeong Hyun, Fast batch verification of multiple signatures, 442-457 [Zbl 1161.94439]
Boldyreva, Alexandra; Fischlin, Marc; Palacio, Adriana; Warinschi, Bogdan, A closer look at PKI: security and efficiency, 458-475 [Zbl 1127.94011]
Lai, Junzuo; Kou, Weidong, Self-generated-certificate public key encryption without pairing, 476-489 [Zbl 1161.94413]