-
2
-
-
84906500244
-
-
Cloud Security Alliance: Expanded top ten big data security and privacy challenges (2013)
-
Cloud Security Alliance: Expanded top ten big data security and privacy challenges (2013)
-
-
-
-
4
-
-
84910678443
-
I forgot your password: Randomness attacks against php applications
-
USENIX Association (2012)
-
Argyros, G., Kiayias, A.: I forgot your password: randomness attacks against php applications. In: USENIX Security 2012, p. 6 USENIX Association (2012)
-
(2012)
USENIX Security
, pp. 6
-
-
Argyros, G.1
Kiayias, A.2
-
5
-
-
84865486272
-
Public keys
-
In: Safavi-Naini, R., Canetti, R. (eds.). Springer, Heidelberg
-
Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Public keys. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 626-642. Springer, Heidelberg (2012)
-
(2012)
CRYPTO 2012. LNCS
, vol.7417
, pp. 626-642
-
-
Lenstra, A.K.1
Hughes, J.P.2
Augier, M.3
Bos, J.W.4
Kleinjung, T.5
Wachter, C.6
-
6
-
-
84874300817
-
Randomly failed! the state of randomness in current java implementations
-
In: Dawson, E. (ed.). Springer, Heidelberg
-
Michaelis, K., Meyer, C., Schwenk, J.: Randomly failed! the state of randomness in current java implementations. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 129-144. Springer, Heidelberg (2013)
-
(2013)
CT-RSA 2013. LNCS
, vol.7779
, pp. 129-144
-
-
Michaelis, K.1
Meyer, C.2
Schwenk, J.3
-
8
-
-
84891644065
-
-
September 5
-
Perlroth, N., Larson, J., Shane, S.: N.S.A. able to foil basic safeguards of privacy on web New York Times (September 5, 2013), http://www.nytimes.com/ 2013/09/06/us/nsa-foils-much-internet-encryption.html
-
(2013)
N.S.A. Able to Foil Basic Safeguards of Privacy on Web New York Times
-
-
Perlroth, N.1
Larson, J.2
Shane, S.3
-
9
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
In: Reingold, O. (ed.). Springer, Heidelberg
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
10
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
In: Halevi, S. (ed.). Springer, Heidelberg
-
Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
11
-
-
70350674336
-
On cryptography with auxiliary input
-
In: Mitzenmacher, M. (ed.). ACM
-
Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Mitzenmacher, M. (ed.) STOC 2009, pp. 621-630. ACM (2009)
-
(2009)
STOC 2009
, pp. 621-630
-
-
Dodis, Y.1
Kalai, Y.T.2
Lovett, S.3
-
12
-
-
84864815981
-
Fully leakage-resilient signatures with auxiliary inputs
-
In: Susilo, W., Mu, Y., Seberry, J. (eds.). Springer, Heidelberg
-
Yuen, T.H., Yiu, S.M., Hui, L.C.K.: Fully leakage-resilient signatures with auxiliary inputs. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 294-307. Springer, Heidelberg (2012)
-
(2012)
ACISP 2012. LNCS
, vol.7372
, pp. 294-307
-
-
Yuen, T.H.1
Yiu, S.M.2
Hui, L.C.K.3
-
13
-
-
72449189555
-
Hedged public-key encryption: How to protect against bad randomness
-
In: Matsui, M. (ed.). Springer, Heidelberg
-
Bellare, M., Brakerski, Z., Naor, M., Ristenpart, T., Segev, G., Shacham, H., Yilek, S.: Hedged public-key encryption: How to protect against bad randomness. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 232-249. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 232-249
-
-
Bellare, M.1
Brakerski, Z.2
Naor, M.3
Ristenpart, T.4
Segev, G.5
Shacham, H.6
Yilek, S.7
-
14
-
-
80053151545
-
Randomness leakage in the kem/dem framework
-
In: Boyen, X., Chen, X. (eds.). Springer, Heidelberg
-
Namiki, H., Tanaka, K., Yasunaga, K.: Randomness leakage in the kem/dem framework. In: Boyen, X., Chen, X. (eds.) ProvSec 2011. LNCS, vol. 6980, pp. 309-323. Springer, Heidelberg (2011)
-
(2011)
ProvSec 2011. LNCS
, vol.6980
, pp. 309-323
-
-
Namiki, H.1
Tanaka, K.2
Yasunaga, K.3
-
15
-
-
77949580684
-
Publickey encryption schemes with auxiliary inputs
-
In: Micciancio, D. (ed.). Springer, Heidelberg
-
Dodis, Y., Goldwasser, S., Kalai, Y.T., Peikert, C., Vaikuntanathan, V.: Publickey encryption schemes with auxiliary inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361-381. Springer, Heidelberg (2010)
-
(2010)
TCC 2010. LNCS
, vol.5978
, pp. 361-381
-
-
Dodis, Y.1
Goldwasser, S.2
Kalai, Y.T.3
Peikert, C.4
Vaikuntanathan, V.5
-
16
-
-
84859970436
-
Identity-based encryption resilient to continual auxiliary leakage
-
In: Pointcheval, D., Johansson, T. (eds.). Springer, Heidelberg
-
Yuen, T.H., Chow, S.S.M., Zhang, Y., Yiu, S.M.: Identity-based encryption resilient to continual auxiliary leakage. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 117-134. Springer, Heidelberg (2012)
-
(2012)
Eurocrypt 2012. LNCS
, vol.7237
, pp. 117-134
-
-
Yuen, T.H.1
Chow, S.S.M.2
Zhang, Y.3
Yiu, S.M.4
-
17
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
In: Cachin, C., Camenisch, J.L. (eds.). Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
Eurocrypt 2004. LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
18
-
-
84871587528
-
Signature schemes secure against hard-to-invert leakage
-
In: Wang, X., Sako, K. (eds.). Springer, Heidelberg
-
Faust, S., Hazay, C., Nielsen, J.B., Nordholt, P.S., Zottarel, A.: Signature schemes secure against hard-to-invert leakage. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 98-115. Springer, Heidelberg (2012)
-
(2012)
ASIACRYPT 2012. LNCS
, vol.7658
, pp. 98-115
-
-
Faust, S.1
Hazay, C.2
Nielsen, J.B.3
Nordholt, P.S.4
Zottarel, A.5
-
19
-
-
79953188688
-
After-The-fact leakage in public-key encryption
-
In: Ishai, Y. (ed.). Springer, Heidelberg
-
Halevi, S., Lin, H.: After-the-fact leakage in public-key encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 107-124. Springer, Heidelberg (2011)
-
(2011)
TCC 2011. LNCS
, vol.6597
, pp. 107-124
-
-
Halevi, S.1
Lin, H.2
-
20
-
-
84858329133
-
Leakage-tolerant interactive protocols
-
In: Cramer, R. (ed.). Springer, Heidelberg
-
Bitansky, N., Canetti, R., Halevi, S.: Leakage-tolerant interactive protocols. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 266-284. Springer, Heidelberg (2012)
-
(2012)
TCC 2012. LNCS
, vol.7194
, pp. 266-284
-
-
Bitansky, N.1
Canetti, R.2
Halevi, S.3
-
21
-
-
84926675006
-
-
Cryptology ePrint Archive, Report 2013/323
-
Yuen, T.H., Zhang, Y., Yiu, S.M., Liu, J.K.: Encryption schemes with postchallenge auxiliary inputs. Cryptology ePrint Archive, Report 2013/323 (2013), http://eprint.iacr.org/
-
(2013)
Encryption Schemes with Postchallenge Auxiliary Inputs
-
-
Yuen, T.H.1
Zhang, Y.2
Yiu, S.M.3
Liu, J.K.4
|