Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACNS (21. : 2023 : Kyōto) Applied cryptography and network security ; Part 2
1. Verfasser: Ciampi, Michele (VerfasserIn)
Weitere Verfasser: Xia, Yu (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
DMA’n’Play: Practical Remote Attestation Based on Direct Memory Access 2023 Surminski, Sebastian
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging 2023 Kern, Dustin
A Framework for UC Secure Privacy Preserving Biometric Authentication Using Efficient Functional Encryption 2023 Ernst, Johannes
On the Complete Non-malleability of the Fujisaki-Okamoto Transform 2023 Friolo, Daniele
Low Memory Attacks on Small Key CSIDH 2023 Chi-Domínguez, Jesús-Javier
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges 2023 Beguinet, Hugo
A New Approach to Garbled Circuits 2023 Acharya, Anasuya
Mt. Random: Multi-tiered Randomness Beacons 2023 Cascudo, Ignacio
Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities 2023 Xu, Yongfeng
Publicly Auditable Functional Encryption 2023 Koutsos, Vlasis
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions 2023 Ciampi, Michele
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps 2023 Sentana, I. Wayan Budi
A Forkcipher-Based Pseudo-Random Number Generator 2023 Andreeva, Elena
Practical Robust DKG Protocols for CSIDH 2023 Atapoor, Shahla
Subversion-Resilient Authenticated Encryption Without Random Oracles 2023 Bemmann, Pascal
Scored Anonymous Credentials 2023 Chow, Sherman S. M.
Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS 2023 Hiwatashi, Keitaro
Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era 2023 Kamphuis, Fredrik
Recommendation for a Holistic Secure Embedded ISA Extension 2023 Stolz, Florian
Predicate Private Set Intersection with Linear Complexity 2023 Yang, Yaxi
Alle Artikel auflisten