Showing 1 - 20 results of 82 for search '"Eurocrypt"', query time: 0.75s Refine Results
  1. 1
    Published 2021
    Get fulltext
    Article
  2. 2
    Get fulltext
    Article
  3. 3
    by Sun, Y.
    Published 2021
    View Fulltext in Publisher
    Article
  4. 4
  5. 5
  6. 6
    by Jung Hee Cheon, Minki Hhan, Seungwan Hong, Yongha Son
    Published 2019-01-01
    ... by Albrecht (Eurocrypt 2017), which forces some LWE-based cryptosystems, especially fully homomorphic...
    Get full text
    Article
  7. 7
    ..., CHES 2013; LowMC, EUROCRYPT 2015; HADES, EUROCRYPT 2020; MALICIOUS, CRYPTO 2020), we study...
    Get full text
    Article
  8. 8
    by Yusuke Naito
    Published 2019-06-01
    ... by Black and Rogaway (EUROCRYPT 2002). Improving the security bound is a main research topic for PMAC...
    Get full text
    Article
  9. 9
    by Ting-Yu Huang, 黃定宇
    Published 2001
    .../IPES(IDEA)[1][2], which was proposed by X. Lai and J. Massey in EUROCRYPT 90, and we analyze...
    Get full text
    Others
  10. 10
    by Nandi Mridul, Mandal Avradip
    Published 2008-07-01
    ... paper of PMAC by Black and Rogaway in Eurocrypt-2002, the bound was shown to be (σ + 1)2/2n–1. In FSE...
    Get full text
    Article
  11. 11
    by Hung-Wei Jiang, 江宏瑋
    Published 2011
    ... fifteen years since Naor and Shamir proposed Visual Cryptography in EuroCrypt’94. Fruitful research...
    Get full text
    Others
  12. 12
    by Guan-Ting Chen, 陳冠廷
    Published 2006
    ...碩士 === 國立交通大學 === 資訊科學與工程研究所 === 94 === In EuroCrypt2005, Wang et al. publish their collision...
    Get full text
    Others
  13. 13
    by Yuejun Liu, Rui Zhang, Yongbin Zhou
    Published 2019-08-01
    ... such attacks. Finally, we take Attrapadung’s framework in Eurocrypt’14 as an example to show how to “compile...
    Get full text
    Article
  14. 14
    by Wei-Tao Song, Bin Hu, Xiu-Feng Zhao
    Published 2018-01-01
    ..., the bootstrapping technique of Halevi and Shoup (EUROCRYPT 15) is improved. Firstly, by introducing a definition...
    Get full text
    Article
  15. 15
    by Fuji-Hara Ryoh, Li Xiyang, Miao Ying, Wu Dianhua
    Published 2008-04-01
    ..., which exceeds that of Safavi-Naini and Wang [Proc. of Eurocrypt'98, LNCS 1403, Springer (1998), pp. 527...
    Get full text
    Article
  16. 16
    by Tsung-Hsien Chu, 朱宗顯
    Published 2003
    ...碩士 === 逢甲大學 === 資訊工程所 === 91 === At Eurocrypt’91, D. Chaum and E. Heyst first introduced the notion...
    Get full text
    Others
  17. 17
    by Čurilla, Marcel
    Published 2012
    ... Supervisor: doc. Mgr. Štěpán Holub, Ph.D. Abstract: Stream cipher QUAD was introduced in 2006 on Eurocrypt...
    Get full text
    Dissertation
  18. 18
    by Ben Hamouda--Guichoux, Fabrice
    Published 2016
    ... Eurocrypt'02, comme un outil pour construire des schémas de chiffrement efficaces et sûrs contre les...
    Get full text
  19. 19
    by Nandi Mridul, Pandit Tapas
    Published 2019-10-01
    ...Recently, Attrapadung (Eurocrypt 2014) proposed a generic framework for fully (adaptively) secure...
    Get full text
    Article
  20. 20
    by Huiwen Jia, Chunming Tang, Yanhua Zhang
    Published 2021-07-01
    ... of the ring. From a high level, we adapt Libert et al.’s zero-knowledge argument system (Eurocrypt 2016...
    Get full text
    Article