Survey of information security (Q2385398): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s11432-007-0037-2 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2145819439 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Survey of information security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of SP Networks with Partial Non-Linear Layers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: LBlock: A Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Block Ciphers – Focus on the Linear Layer (feat. PRIDE) / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simplified Representation of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography with Streaming Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: A survey on fast correlation attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: An overview of distinguishing attacks on stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: High order differential attacks on stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applying cube attacks to stream ciphers in realistic scenarios / rank
 
Normal rank
Property / cites work
 
Property / cites work: Further Results on the Decomposition of an NFSR Into the Cascade Connection of an NFSR Into an LFSR / rank
 
Normal rank
Property / cites work
 
Property / cites work: Further results on the distinctness of modulo 2 reductions of primitive sequences over \(\mathbb{Z}/(2^{32}-1)\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Collision Search Attacks on SHA-0 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Hash Functions MD4 and RIPEMD / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Updates on Generic Attacks against HMAC and NMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of HMAC/NMAC-Whirlpool / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Generic Attacks against Hash-Based MACs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Related-Key Attacks for HMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Homomorphic MACs for Arithmetic Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: ALE: AES-Based Lightweight Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Authenticated-Encryption AEZ and the Problem That It Solves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector / rank
 
Normal rank
Property / cites work
 
Property / cites work: KDM-CCA Security from RKA Secure Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Securely Release Unverified Plaintext in Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of FIDES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity Based Encryption with Constant Size Ciphertext / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption over NTRU Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Hierarchical) Identity-Based Encryption from Affine Message Authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Low Overhead Broadcast Encryption from Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Dual System ABE in Prime-Order Groups via Predicate Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Witness encryption and its applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Witness Encryption from Instance Independent Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Origins and Recent Developments / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Semantic Security of Functional Encryption Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Non-perfect Uniform Secret Sharing Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function Secret Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: The knowledge complexity of interactive proof-systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3789104 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Concurrent knowledge extraction in public-key models / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant-Round Concurrent Zero Knowledge in the Bounded Player Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quasi-Adaptive NIZK for Linear Subspaces Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Bitcoin Backbone Protocol: Analysis and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Round-Efficient Black-Box Construction of Composable Multi-Party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Multi-Party Computation with Identifiable Abort / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Interactive Secure Multiparty Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side channel cryptanalysis of product ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chinese remaindering based cryptosystems in the presence of faults / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797801 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side-Channel Analysis of Multiplications in GF(2128) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Behind the Scene of Side Channel Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Noisy Leakage Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulatable Leakage: Analysis, Pitfalls, and New Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Tolerant Computation with Input-Independent Preprocessing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413867 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Xiao – Lai White-Box AES Implementation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symmetric-key cryptosystem with DNA technology / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymmetric encryption and signature method with DNA technology / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography using any two nonorthogonal states / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (im)possibility of obfuscating programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) fully homomorphic encryption without bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Signatures from Standard Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bonsai trees, or how to delegate a lattice basis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical aspects of measurement-device-independent quantum key distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-key cryptosystems from the worst-case shortest vector problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Signatures without Trapdoors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Signatures and Bimodal Gaussians / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authenticated Key Exchange from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework for Efficient and Composable Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: SWIFFT: A Modest Proposal for FFT Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) Fully Homomorphic Encryption without Bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Bootstrapping in Quasilinear Time / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster Bootstrapping with Polynomial Error / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2721147 / rank
 
Normal rank
Property / cites work
 
Property / cites work: k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full text retrieval based on syntactic similarities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-theoretic analysis of information hiding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implementation of real-time constrained linear discriminant analysis to remote sensing image classification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4794246 / rank
 
Normal rank

Latest revision as of 09:58, 27 June 2024

scientific article
Language Label Description Also known as
English
Survey of information security
scientific article

    Statements

    Survey of information security (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    12 October 2007
    0 references
    information security
    0 references
    cryptology
    0 references
    trusted computing
    0 references
    network security
    0 references
    information hiding
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references