Coverart for item
The Resource Public key cryptography-- PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, edited by Marc Fischlin, Johannes Buchmann, Mark Manulis, (electronic book)

Public key cryptography-- PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, edited by Marc Fischlin, Johannes Buchmann, Mark Manulis, (electronic book)

Label
Public key cryptography-- PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
Title
Public key cryptography-- PKC 2012
Title remainder
15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
Statement of responsibility
edited by Marc Fischlin, Johannes Buchmann, Mark Manulis
Title variation
PKC 2012
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
GW5XE
Dewey number
005.8/2
Index
index present
LC call number
QA76.9.A25
LC item number
I58 2012
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
International Workshop on Practice and Theory in Public Key Cryptography
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Fischlin, Marc
  • Buchmann, Johannes
  • Manulis, Mark
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
7293
http://library.link/vocab/subjectName
  • Public key cryptography
  • Data encryption (Computer science)
Label
Public key cryptography-- PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, edited by Marc Fischlin, Johannes Buchmann, Mark Manulis, (electronic book)
Instantiates
Publication
Note
International conference proceedings
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Waters Signatures with Optimal Security Reduction
  • Dennis Hofheinz, Tibor Jager and Edward Knapp
  • Strong Security from Probabilistic Signature Schemes
  • Sven Schäge
  • Space Efficient Signature Schemes from the RSA Assumption
  • Shota Yamada, Goichiro Hanaoka and Noboru Kunihiro
  • The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
  • Qiong Huang, Duncan S. Wong and Willy Susilo
  • Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
  • Pierre-Louis Cayrel, Gerhard Hoffmann and Edoardo Persichetti
  • Better Bootstrapping in Fully Homomorphic Encryption
  • Craig Gentry, Shai Halevi and Nigel P. Smart
  • Polly Cracker, Revisited, Revisited
  • Gottfried Herold
  • Ring-LWE in Polynomial Rings
  • Léo Ducas and Alain Durmus
  • On Homomorphic Encryption and Chosen-Ciphertext Security
  • Brett Hemenway and Rafail Ostrovsky
  • Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
  • Nelly Fazio and Irippuge Milinda Perera
  • Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
  • Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt and Goichiro Hanaoka, et al.
  • Public Key Encryption against Related Key Attacks
  • Hoeteck Wee
  • Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
  • Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris and Hoeteck Wee
  • Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited
  • Enrico Thomae and Christopher Wolf
  • Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
  • Koichi Sakumoto
  • Public-Key Cryptography from New Multivariate Quadratic Assumptions
  • Yun-Ju Huang, Feng-Hao Liu and Bo-Yin Yang
  • Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
  • Benoît Libert, Kenneth G. Paterson and Elizabeth A. Quaglia
  • Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary and Huaxiong Wang
  • Generating Provable Primes Efficiently on Embedded Devices
  • Christophe Clavier, Benoit Feix, Loïc Thierry and Pascal Paillier
  • Password-Based Authenticated Key Exchange
  • David Pointcheval
  • Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
  • Jae Hong Seo, Jung Hee Cheon and Jonathan Katz
  • Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
  • Emil Stefanov, Elaine Shi and Dawn Song
  • Variants of Waters' Dual System Primitives Using Asymmetric Pairings
  • (Extended Abstract)
  • Somindu C. Ramanna, Sanjit Chatterjee and Palash Sarkar
  • From Selective to Full Security: Semi-generic Transformations in the Standard Model
  • Michel Abdalla, Dario Fiore and Vadim Lyubashevsky
  • Circular and KDM Security for Identity-Based Encryption
  • Jacob Alperin-Sheriff and Chris Peikert
  • NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
  • Multi-location Leakage Resilient Cryptography
  • Ali Juma, Yevgeniy Vahlis and Moti Yung
  • On Definitions of Selective Opening Security
  • Florian Böhl, Dennis Hofheinz and Daniel Kraschewski
  • New Definitions and Separations for Circular Security
  • David Cash, Matthew Green and Susan Hohenberger
  • Correlated Product Security from Any One-Way Function
  • Brett Hemenway, Steve Lu and Rafail Ostrovsky
  • Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms
  • Takahiro Matsuda, Goichiro Hanaoka and Kanta Matsuura
  • Efficiently Shuffling in Public
  • Udaya Parampalli, Kim Ramchen and Vanessa Teague
  • Efficient Password Authenticated Key Exchange via Oblivious Transfer
  • Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan and Hoeteck Wee
  • Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
  • Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa and Kazuki Yoneyama
  • Relatively-Sound NIZKs and Password-Based Key-Exchange
  • Charanjit Jutla and Arnab Roy
  • Security of Blind Signatures Revisited
  • Dominique Schröder and Dominique Unruh
  • Efficient Network Coding Signatures in the Standard Model
  • Dario Catalano, Dario Fiore and Bogdan Warinschi
  • Improved Security for Linearly Homomorphic Signatures: A Generic Framework
  • David Mandell Freeman
  • On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
  • Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka and Kazuo Ohta
  • Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
  • Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka and Masaya Yasuda
  • Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
  • Aurélie Bauer, Damien Vergnaud and Jean-Christophe Zapalowicz
  • Extended-DDH and Lossy Trapdoor Functions
  • Brett Hemenway and Rafail Ostrovsky
  • DDH-Like Assumptions Based on Extension Rings
  • Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias and Angela Zottarel
Control code
SPR794225461
Dimensions
unknown
Extent
1 online resource (xiv, 734 p.)
File format
unknown
Form of item
online
Isbn
9783642300578
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote
Label
Public key cryptography-- PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, edited by Marc Fischlin, Johannes Buchmann, Mark Manulis, (electronic book)
Publication
Note
International conference proceedings
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Waters Signatures with Optimal Security Reduction
  • Dennis Hofheinz, Tibor Jager and Edward Knapp
  • Strong Security from Probabilistic Signature Schemes
  • Sven Schäge
  • Space Efficient Signature Schemes from the RSA Assumption
  • Shota Yamada, Goichiro Hanaoka and Noboru Kunihiro
  • The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
  • Qiong Huang, Duncan S. Wong and Willy Susilo
  • Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
  • Pierre-Louis Cayrel, Gerhard Hoffmann and Edoardo Persichetti
  • Better Bootstrapping in Fully Homomorphic Encryption
  • Craig Gentry, Shai Halevi and Nigel P. Smart
  • Polly Cracker, Revisited, Revisited
  • Gottfried Herold
  • Ring-LWE in Polynomial Rings
  • Léo Ducas and Alain Durmus
  • On Homomorphic Encryption and Chosen-Ciphertext Security
  • Brett Hemenway and Rafail Ostrovsky
  • Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
  • Nelly Fazio and Irippuge Milinda Perera
  • Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
  • Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt and Goichiro Hanaoka, et al.
  • Public Key Encryption against Related Key Attacks
  • Hoeteck Wee
  • Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
  • Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris and Hoeteck Wee
  • Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited
  • Enrico Thomae and Christopher Wolf
  • Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
  • Koichi Sakumoto
  • Public-Key Cryptography from New Multivariate Quadratic Assumptions
  • Yun-Ju Huang, Feng-Hao Liu and Bo-Yin Yang
  • Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
  • Benoît Libert, Kenneth G. Paterson and Elizabeth A. Quaglia
  • Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary and Huaxiong Wang
  • Generating Provable Primes Efficiently on Embedded Devices
  • Christophe Clavier, Benoit Feix, Loïc Thierry and Pascal Paillier
  • Password-Based Authenticated Key Exchange
  • David Pointcheval
  • Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
  • Jae Hong Seo, Jung Hee Cheon and Jonathan Katz
  • Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
  • Emil Stefanov, Elaine Shi and Dawn Song
  • Variants of Waters' Dual System Primitives Using Asymmetric Pairings
  • (Extended Abstract)
  • Somindu C. Ramanna, Sanjit Chatterjee and Palash Sarkar
  • From Selective to Full Security: Semi-generic Transformations in the Standard Model
  • Michel Abdalla, Dario Fiore and Vadim Lyubashevsky
  • Circular and KDM Security for Identity-Based Encryption
  • Jacob Alperin-Sheriff and Chris Peikert
  • NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
  • Multi-location Leakage Resilient Cryptography
  • Ali Juma, Yevgeniy Vahlis and Moti Yung
  • On Definitions of Selective Opening Security
  • Florian Böhl, Dennis Hofheinz and Daniel Kraschewski
  • New Definitions and Separations for Circular Security
  • David Cash, Matthew Green and Susan Hohenberger
  • Correlated Product Security from Any One-Way Function
  • Brett Hemenway, Steve Lu and Rafail Ostrovsky
  • Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms
  • Takahiro Matsuda, Goichiro Hanaoka and Kanta Matsuura
  • Efficiently Shuffling in Public
  • Udaya Parampalli, Kim Ramchen and Vanessa Teague
  • Efficient Password Authenticated Key Exchange via Oblivious Transfer
  • Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan and Hoeteck Wee
  • Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
  • Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa and Kazuki Yoneyama
  • Relatively-Sound NIZKs and Password-Based Key-Exchange
  • Charanjit Jutla and Arnab Roy
  • Security of Blind Signatures Revisited
  • Dominique Schröder and Dominique Unruh
  • Efficient Network Coding Signatures in the Standard Model
  • Dario Catalano, Dario Fiore and Bogdan Warinschi
  • Improved Security for Linearly Homomorphic Signatures: A Generic Framework
  • David Mandell Freeman
  • On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
  • Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka and Kazuo Ohta
  • Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
  • Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka and Masaya Yasuda
  • Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
  • Aurélie Bauer, Damien Vergnaud and Jean-Christophe Zapalowicz
  • Extended-DDH and Lossy Trapdoor Functions
  • Brett Hemenway and Rafail Ostrovsky
  • DDH-Like Assumptions Based on Extension Rings
  • Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias and Angela Zottarel
Control code
SPR794225461
Dimensions
unknown
Extent
1 online resource (xiv, 734 p.)
File format
unknown
Form of item
online
Isbn
9783642300578
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote

Library Locations

Processing Feedback ...