Zobrazeno 1 - 10
of 61
pro vyhledávání: '"Georg Fuchsbauer"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 3 (2019)
We study the security of symmetric primitives against key-correlated attacks (KCA), whereby an adversary can arbitrarily correlate keys, messages, and ciphertexts. Security against KCA is required whenever a primitive should securely encrypt key-depe
Externí odkaz:
https://doaj.org/article/1c813c0eb7f748008ecc97ac8b9afc26
Publikováno v:
Journal of Computer Security. 30:3-38
A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she signs two messages with the
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031147906
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0c432caeaf514ad98d1fd0d86b2e192d
https://doi.org/10.1007/978-3-031-14791-3_14
https://doi.org/10.1007/978-3-031-14791-3_14
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229626
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2022
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229626
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2022
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031147906
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::034b08527fd315dbed3efdccf2892c83
https://doi.org/10.1007/978-3-031-14791-3_6
https://doi.org/10.1007/978-3-031-14791-3_6
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920678
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9056ca80a4c50ea98600dfab5ef9051c
https://doi.org/10.1007/978-3-030-92068-5_20
https://doi.org/10.1007/978-3-030-92068-5_20
Publikováno v:
Public-Key Cryptography – PKC 2021 ISBN: 9783030752477
Public Key Cryptography (2)
Public Key Cryptography (2)
Transferable e-cash is the most faithful digital analog of physical cash, as it allows users to transfer coins between them in isolation, that is, without interacting with a bank or a “ledger”. Appropriate protection of user privacy and, at the s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a205802bd8d883c4e8f0c18b213d3dcc
https://doi.org/10.1007/978-3-030-75248-4_20
https://doi.org/10.1007/978-3-030-75248-4_20
Publikováno v:
SCN 2020-12th International Conference Security and Cryptography for Networks
SCN 2020-12th International Conference Security and Cryptography for Networks, Sep 2020, Amalfi / Virtual, Italy. pp.338-358
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
SCN 2020-12th International Conference Security and Cryptography for Networks, Sep 2020, Amalfi / Virtual, Italy. pp.338-358
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
International audience; A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she sign
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8f61cd7a06ea2f008edd2021b3eeefc6
https://hal.inria.fr/hal-03066338
https://hal.inria.fr/hal-03066338
Publikováno v:
Advances in Cryptology – CRYPTO 2020.
CRYPTO 2020-40th Annual International Cryptology Conference
CRYPTO 2020-40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.121-151, ⟨10.1007/978-3-030-56880-1_5⟩
Advances in Cryptology – CRYPTO 2020 ISBN: 9783030568795
CRYPTO (2)
CRYPTO 2020-40th Annual International Cryptology Conference
CRYPTO 2020-40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.121-151, ⟨10.1007/978-3-030-56880-1_5⟩
Advances in Cryptology – CRYPTO 2020 ISBN: 9783030568795
CRYPTO (2)
International audience; a We give a taxonomy of computational assumptions in the algebraic group model (AGM). We first analyze Boyen's Uber assumption family for bilinear groups and then extend it in several ways to cover assumptions as diverse as Ga
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::947aa3c98faea55fb5a4c47e8d42ee9e
https://hal.science/hal-02968271
https://hal.science/hal-02968271
Publikováno v:
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457235
EUROCRYPT (2)
EUROCRYPT (2)
The Schnorr blind signing protocol allows blind issuing of Schnorr signatures, one of the most widely used signatures. Despite its practical relevance, its security analysis is unsatisfactory. The only known security proof is informal and in the comb
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f6c236434d2dd77f616b2a503be65757
https://doi.org/10.1007/978-3-030-45724-2_3
https://doi.org/10.1007/978-3-030-45724-2_3