Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Rijneveld, J."'
Publikováno v:
Deng, R.H. (ed.), Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, pp. 281-301
Deng, R.H. (ed.), Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, 281-301. Berlin : Springer
STARTPAGE=281;ENDPAGE=301;ISSN=0302-9743;TITLE=Deng, R.H. (ed.), Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings
Deng, R.H. (ed.), Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, 281-301. Berlin : Springer
STARTPAGE=281;ENDPAGE=301;ISSN=0302-9743;TITLE=Deng, R.H. (ed.), Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings
Contains fulltext : 204489.pdf (Publisher’s version ) (Closed access) Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019
Contains fulltext : 236576.pdf (Author’s version preprint ) (Open Access) This document is a detailed specification of the design and security arguments of the digital signature scheme MQDSS. It is divided in two main parts:• Part I Backbone resu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::e1cdf2ee785415f0794650138e2ba79e
http://hdl.handle.net/2066/236576
http://hdl.handle.net/2066/236576
Autor:
Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P., Cavallaro, L.
Publikováno v:
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Cavallaro, L. (ed.), CCS '19:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom — November 11-15, 2019, pp. 2129-2146
Cavallaro, L. (ed.), CCS '19:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom — November 11-15, 2019, 2129-2146. New York : ACM
STARTPAGE=2129;ENDPAGE=2146;TITLE=Cavallaro, L. (ed.), CCS '19:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom — November 11-15, 2019
CCS
CCS 2019-Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2129-2146
STARTPAGE=2129;ENDPAGE=2146;TITLE=CCS 2019-Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Cavallaro, L. (ed.), CCS '19:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom — November 11-15, 2019, pp. 2129-2146
Cavallaro, L. (ed.), CCS '19:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom — November 11-15, 2019, 2129-2146. New York : ACM
STARTPAGE=2129;ENDPAGE=2146;TITLE=Cavallaro, L. (ed.), CCS '19:Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom — November 11-15, 2019
CCS
CCS 2019-Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2129-2146
STARTPAGE=2129;ENDPAGE=2146;TITLE=CCS 2019-Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has significant advantages over the state of the art in terms of speed, signature size, and security, and is among the nine remaining signature schemes in the second round of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3401d79ac1dc1e10648cbd2ffb8a691d
https://doi.org/10.1145/3319535.3363229
https://doi.org/10.1145/3319535.3363229
Publikováno v:
ISGT Europe
Costoiu, M. (ed.), Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29-October 2, 2019, 1-5. Los Alamitos : IEEE
STARTPAGE=1;ENDPAGE=5;TITLE=Costoiu, M. (ed.), Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29-October 2, 2019
Costoiu, M. (ed.), Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29-October 2, 2019, pp. 1-5
Costoiu, M. (ed.), Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29-October 2, 2019, 1-5. Los Alamitos : IEEE
STARTPAGE=1;ENDPAGE=5;TITLE=Costoiu, M. (ed.), Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29-October 2, 2019
Costoiu, M. (ed.), Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29-October 2, 2019, pp. 1-5
In this paper we propose a cryptographic solution that provides non-repudiation and end-to-end security for the electric-vehicle-charging ecosystem as it exists in the Netherlands. It is designed to provide long-term non-repudiation, while allowing f
Publikováno v:
Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019, pp. 1-22
Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019, 1-22. [S.l.] : CSRC
STARTPAGE=1;ENDPAGE=22;TITLE=Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019
Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019, 1-22. [S.l.] : CSRC
STARTPAGE=1;ENDPAGE=22;TITLE=Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019
Contains fulltext : 210214.pdf (Author’s version preprint ) (Open Access) Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::36d950bccd100426eef7e5c02629cac0
https://hdl.handle.net/2066/210214
https://hdl.handle.net/2066/210214
Autor:
Hülsing, A., Rijneveld, J., Schwabe, P., Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y.
Publikováno v:
Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, 446-470. Berlin, Heidelberg : Springer Berlin Heidelberg
STARTPAGE=446;ENDPAGE=470;ISSN=0302-9743;TITLE=Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, pp. 446-470
STARTPAGE=446;ENDPAGE=470;ISSN=0302-9743;TITLE=Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, pp. 446-470
Contains fulltext : 155743.pdf (Author’s version preprint ) (Open Access)
Autor:
Hülsing, A.T., Rijneveld, J., Song, F., Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y.
Publikováno v:
Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, 387-416. Berlin, Heidelberg : Springer Berlin Heidelberg
STARTPAGE=387;ENDPAGE=416;ISSN=0302-9743;TITLE=Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Public-Key Cryptography – PKC 2016
Public-Key Cryptography-PKC 2016-19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings, part I, 9614, 387-416
Public-Key Cryptography – PKC 2016 ISBN: 9783662493830
Public Key Cryptography (1)
Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, pp. 387-416
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2016
STARTPAGE=387;ENDPAGE=416;ISSN=0302-9743;TITLE=Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Public-Key Cryptography – PKC 2016
Public-Key Cryptography-PKC 2016-19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings, part I, 9614, 387-416
Public-Key Cryptography – PKC 2016 ISBN: 9783662493830
Public Key Cryptography (1)
Cheng, C.-M.; Chung, K.-M.; Persiano, G. (ed.), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, pp. 387-416
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2016
This work introduces XMSS-T, a new stateful hash-based signature scheme with tight security. Previous hash-based signatures are facing a loss of security, linear in performance parameters such as the total tree height. Our new scheme can achieve the
Autor:
Hülsing, A.T., Rijneveld, J., Schwabe, P., Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y.
Publikováno v:
Public-Key Cryptography – PKC 2016 ISBN: 9783662493830
Public Key Cryptography (1)
Public-Key Cryptography-PKC 2016-19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I, 446-470
STARTPAGE=446;ENDPAGE=470;TITLE=Public-Key Cryptography-PKC 2016-19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I
Public Key Cryptography (1)
Public-Key Cryptography-PKC 2016-19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I, 446-470
STARTPAGE=446;ENDPAGE=470;TITLE=Public-Key Cryptography-PKC 2016-19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I
This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on an embedded microprocessor with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generat
Publikováno v:
Abdalla, M. (ed.), Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II, 3-33. Berlin : Springer
STARTPAGE=3;ENDPAGE=33;ISSN=0302-9743;TITLE=Abdalla, M. (ed.), Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II
PKC 2018
Abdalla, M. (ed.), Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II, pp. 3-33
STARTPAGE=3;ENDPAGE=33;ISSN=0302-9743;TITLE=Abdalla, M. (ed.), Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II
PKC 2018
Abdalla, M. (ed.), Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II, pp. 3-33
Contains fulltext : 195408.pdf (Publisher’s version ) (Closed access)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::fab81d7493a9f51f8afa32b15a1ae5ab
http://hdl.handle.net/2066/195408
http://hdl.handle.net/2066/195408
Autor:
Laan, E, Poll, E., Rijneveld, J., Ruiter, J.E.J. de, Schwabe, P., Verschuren, J., Inomata, A.
Publikováno v:
Inomata, A. (ed.), Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, pp. 127-142
Inomata, A. (ed.), Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, 127-142. Cham : Springer International Publishing
STARTPAGE=127;ENDPAGE=142;ISSN=0302-9743;TITLE=Inomata, A. (ed.), Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
Inomata, A. (ed.), Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings, 127-142. Cham : Springer International Publishing
STARTPAGE=127;ENDPAGE=142;ISSN=0302-9743;TITLE=Inomata, A. (ed.), Advances in Information and Computer Security: 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
Contains fulltext : 195383.pdf (Publisher’s version ) (Open Access) The current Java Card platform does not seem to allow for fast implementations of hash-based signature schemes. While the underlying implementation of the cryptographic primitives
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::335d8049e0dc3250fa8868ae4af4ad86
https://hdl.handle.net/2066/195383
https://hdl.handle.net/2066/195383