Survey of information security
From MaRDI portal
Publication:2385398
DOI10.1007/s11432-007-0037-2zbMath1142.94013OpenAlexW2145819439MaRDI QIDQ2385398
Huanguo Zhang, Jiwu Huang, Chang-Xiang Shen, Dengguo Feng, Zhen Fu Cao
Publication date: 12 October 2007
Published in: Science in China. Series F (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11432-007-0037-2
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Network protocols (68M12)
Related Items
Uses Software
Cites Work
- How to Break MD5 and Other Hash Functions
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- On the (im)possibility of obfuscating programs
- Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
- Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$
- Witness encryption and its applications
- Side channel cryptanalysis of product ciphers
- On lattices, learning with errors, random linear codes, and cryptography
- Differential Privacy
- Advances in Cryptology - ASIACRYPT 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- (Leveled) Fully Homomorphic Encryption without Bootstrapping
- Concurrent knowledge extraction in public-key models
- An overview of distinguishing attacks on stream ciphers
- Full text retrieval based on syntactic similarities
- Chinese remaindering based cryptosystems in the presence of faults
- Bonsai trees, or how to delegate a lattice basis
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Further results on the distinctness of modulo 2 reductions of primitive sequences over \(\mathbb{Z}/(2^{32}-1)\)
- A survey on fast correlation attacks
- High order differential attacks on stream ciphers
- Applying cube attacks to stream ciphers in realistic scenarios
- Survey of information security
- Symmetric-key cryptosystem with DNA technology
- Implementation of real-time constrained linear discriminant analysis to remote sensing image classification
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- (Leveled) fully homomorphic encryption without bootstrapping
- Practical Bootstrapping in Quasilinear Time
- Lattice Signatures and Bimodal Gaussians
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
- New Generic Attacks against Hash-Based MACs
- Cryptanalysis of HMAC/NMAC-Whirlpool
- Constant-Round Concurrent Zero Knowledge in the Bounded Player Model
- Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE
- Behind the Scene of Side Channel Attacks
- Block Ciphers – Focus on the Linear Layer (feat. PRIDE)
- Updates on Generic Attacks against HMAC and NMAC
- Low Overhead Broadcast Encryption from Multilinear Maps
- Faster Bootstrapping with Polynomial Error
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Witness Encryption from Instance Independent Assumptions
- Cryptography with Streaming Algorithms
- Leakage-Tolerant Computation with Input-Independent Preprocessing
- Optimal Non-perfect Uniform Secret Sharing Schemes
- Round-Efficient Black-Box Construction of Composable Multi-Party Computation
- Secure Multi-Party Computation with Identifiable Abort
- Non-Interactive Secure Multiparty Computation
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Lattice Signatures without Trapdoors
- Efficient Identity-Based Encryption over NTRU Lattices
- Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- Side-Channel Analysis of Multiplications in GF(2128)
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET
- Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- A Simplified Representation of AES
- Simulatable Leakage: Analysis, Pitfalls, and New Constructions
- ALE: AES-Based Lightweight Authenticated Encryption
- Cryptanalysis of FIDES
- Cryptanalysis of the Multilinear Map over the Integers
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- KDM-CCA Security from RKA Secure Authenticated Encryption
- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
- Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware
- Noisy Leakage Revisited
- The Bitcoin Backbone Protocol: Analysis and Applications
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- Function Secret Sharing
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Authenticated Key Exchange from Ideal Lattices
- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
- Identity-Based Cryptosystems and Signature Schemes
- Further Results on the Decomposition of an NFSR Into the Cascade Connection of an NFSR Into an LFSR
- LBlock: A Lightweight Block Cipher
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Cryptanalysis of the Xiao – Lai White-Box AES Implementation
- PRESENT: An Ultra-Lightweight Block Cipher
- SWIFFT: A Modest Proposal for FFT Hashing
- Trapdoors for hard lattices and new cryptographic constructions
- On Ideal Lattices and Learning with Errors over Rings
- A Framework for Efficient and Composable Oblivious Transfer
- The knowledge complexity of interactive proof-systems
- Quantum cryptography using any two nonorthogonal states
- Information-theoretic analysis of information hiding
- Identity-Based Encryption from the Weil Pairing
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Generic Related-Key Attacks for HMAC
- Functional Encryption: Origins and Recent Developments
- On the Semantic Security of Functional Encryption Schemes
- Practical Homomorphic MACs for Arithmetic Circuits
- Practical Signatures from Standard Assumptions
- Asymmetric encryption and signature method with DNA technology
- Practical aspects of measurement-device-independent quantum key distribution
- Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
- Fully homomorphic encryption using ideal lattices
- Public-key cryptosystems from the worst-case shortest vector problem
- How to use indistinguishability obfuscation
- Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
- Cryptanalysis of the Hash Functions MD4 and RIPEMD