Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Jeroen Pijnenburg"'
Autor:
Jeroen Pijnenburg, Bertram Poettering
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 2 (2020)
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme. In brief, key assignment associates with each object in the hierarchy a unique symmetri
Externí odkaz:
https://doaj.org/article/7eb72672005b4d43a5ebb5a0e1e0522e
Autor:
Jeroen Pijnenburg, Bertram Poettering
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229688
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9192c31ddd40478554d8f531a3781f60
https://doi.org/10.1007/978-3-031-22969-5_4
https://doi.org/10.1007/978-3-031-22969-5_4
Autor:
Bertram Poettering, Jeroen Pijnenburg
Publikováno v:
Computer Security – ESORICS 2020 ISBN: 9783030589509
ESORICS (1)
ESORICS (1)
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage. The setting assumes a memory-bounded computing device that inflates the amount of volatile or permanent memory available to it by letting oth
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fb854b3b38485263d1b375fa4f300192
https://doi.org/10.5281/zenodo.4146854
https://doi.org/10.5281/zenodo.4146854
Autor:
Bertram Poettering, Jeroen Pijnenburg
Publikováno v:
Proceedings of the 2nd Workshop on Cyber-Security Arms Race
CYSARM@CCS
CYSARM@CCS
Recent work by Pijnenburg and Poettering (ESORICS'20) explores the novel cryptographic Encrypt-to-Self primitive that is dedicated to use cases of symmetric encryption where encryptor and decryptor coincide. The primitive is envisioned to be useful w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4fca4ae2bb50f8f8b42f13bf079815fc
Autor:
Benjamin Smith, Huapeng Wu
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24–26, 2022. The 21 full papers presented in this volume were c
Autor:
Shweta Agrawal, Dongdai Lin
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during Decem
Autor:
Steven D. Galbraith
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2022, CT-RSA 2022, held in San Francisco, CA, USA, in February 2022.• The 24 full papers presented in this volume were carefully reviewed and selected
Autor:
Orr Dunkelman, Stefan Dziembowski
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 M
This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed a
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the