Lecture Notes in Computer Science

Results: 278



#Item
1Cryptography / Digital signature / Random oracle / IP / Ibi / Schnorr signature

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:38
2Cryptography / Public-key cryptography / Identity-based cryptography / ID-based encryption / Advantage / Paillier cryptosystem / BonehFranklin scheme

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:55
3Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
4Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
5

Consent to Publish 123 Lecture Notes in Computer Science

Add to Reading List

Source URL: www.lsis.org

Language: English - Date: 2016-01-07 15:27:50
    6

    123 Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: New

    Add to Reading List

    Source URL: www.biplab.unisa.it

    Language: English - Date: 2017-07-10 02:39:18
      7

      Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Volume Editor(s

      Add to Reading List

      Source URL: www.miccai2018.org

      Language: English - Date: 2018-02-28 09:31:26
        8

        Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Volume Editor(s

        Add to Reading List

        Source URL: www.raid2018.org

        Language: English - Date: 2018-08-09 05:10:21
          9

          Published in P. Y. A. Ryan, D. Naccache, and J.-J. Quisquater, Eds., The New Codebreakers (Kahn Festschrift), volof Lecture Notes in Computer Science, pp, Springer, 2016. Secure ElGamal-type Cryptosystems

          Add to Reading List

          Source URL: joye.site88.net

          Language: English - Date: 2016-03-24 12:20:23
            10Intellectual property law / Copyright law / Law / Data / Computing / Copyright law of the United States / Copyright / Springer Science+Business Media / Copyright policies of academic publishers / Collective work

            123 Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: Advances

            Add to Reading List

            Source URL: www.ecir2018.org

            Language: English - Date: 2017-12-13 09:29:41
            UPDATE