Survey of information security
DOI10.1007/S11432-007-0037-2zbMATH Open1142.94013OpenAlexW2145819439MaRDI QIDQ2385398FDOQ2385398
Authors: Chang-Xiang Shen, Huanguo Zhang, Dengguo Feng, Jiwu Huang, Zhenfu Cao
Publication date: 12 October 2007
Published in: Science in China. Series F (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11432-007-0037-2
Recommendations
- Publication:4502754
- Security and protection in information processing systems. IFIP 18th world computer congress, TC11 19th international information security conference, 22--27 August 2004, Toulouse, France.
- Information security, mathematics, and public-key cryptography
- Mathematical and computer modelling in information system security
- Handbook of information and communication security
Data encryption (aspects in computer science) (68P25) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60) Network protocols (68M12)
Cites Work
- LBlock: a lightweight block cipher
- SWIFFT: A Modest Proposal for FFT Hashing
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Differential Privacy
- On ideal lattices and learning with errors over rings
- Fully homomorphic encryption using ideal lattices
- Public-key cryptosystems from the worst-case shortest vector problem
- On lattices, learning with errors, random linear codes, and cryptography
- (Leveled) fully homomorphic encryption without bootstrapping
- Identity-Based Cryptosystems and Signature Schemes
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Trapdoors for hard lattices and new cryptographic constructions
- Quantum cryptography using any two nonorthogonal states
- Identity-Based Encryption from the Weil Pairing
- Title not available (Why is that?)
- Practical aspects of measurement-device-independent quantum key distribution
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Certificateless public key cryptography
- Further results on the distinctness of modulo 2 reductions of primitive sequences over \(\mathbb{Z}/(2^{32}-1)\)
- Applying cube attacks to stream ciphers in realistic scenarios
- Concurrent knowledge extraction in public-key models
- Constant-round concurrent zero knowledge in the bounded player model
- PRESENT: An Ultra-Lightweight Block Cipher
- The knowledge complexity of interactive proof-systems
- (Leveled) fully homomorphic encryption without bootstrapping
- Lattice signatures without trapdoors
- A Framework for Efficient and Composable Oblivious Transfer
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
- Title not available (Why is that?)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- Lattice signatures and bimodal Gaussians
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Forging attacks on two authenticated encryption schemes COBRA and POET
- Finding Collisions in the Full SHA-1
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Efficient Collision Search Attacks on SHA-0
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- How to use indistinguishability obfuscation
- A survey on fast correlation attacks
- Title not available (Why is that?)
- Cryptanalysis of HMAC/NMAC-Whirlpool
- An overview of distinguishing attacks on stream ciphers
- ALE: AES-Based Lightweight Authenticated Encryption
- Generic Related-Key Attacks for HMAC
- High order differential attacks on stream ciphers
- On the (im)possibility of obfuscating programs
- Block ciphers -- focus on the linear layer (feat. PRIDE)
- Cryptanalysis of the Multilinear Map over the Integers
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Information-theoretic analysis of information hiding
- Behind the scene of side channel attacks
- How to securely release unverified plaintext in authenticated encryption
- The Bitcoin Backbone Protocol: Analysis and Applications
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- Efficient fully homomorphic encryption from (standard) LWE
- Simulatable leakage: analysis, pitfalls, and new constructions
- Bonsai trees, or how to delegate a lattice basis
- (Hierarchical) identity-based encryption from affine message authentication
- Efficient identity-based encryption over NTRU lattices
- A simplified representation of AES
- Title not available (Why is that?)
- Low overhead broadcast encryption from multilinear maps
- Non-interactive secure multiparty computation
- Updates on generic attacks against HMAC and NMAC
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- Further Results on the Decomposition of an NFSR Into the Cascade Connection of an NFSR Into an LFSR
- Cryptanalysis of the Xiao – Lai White-Box AES Implementation
- Title not available (Why is that?)
- Witness encryption and its applications
- Implementation of real-time constrained linear discriminant analysis to remote sensing image classification
- Replacing a random oracle: full domain hash from indistinguishability obfuscation
- FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
- Survey of information security
- Full text retrieval based on syntactic similarities
- Witness encryption from instance independent assumptions
- Round-efficient black-box construction of composable multi-party computation
- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
- Function Secret Sharing
- Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
- New generic attacks against hash-based MACs
- Faster Bootstrapping with Polynomial Error
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Optimal non-perfect uniform secret sharing schemes
- Side-Channel Analysis of Multiplications in GF(2128)
- Authenticated Key Exchange from Ideal Lattices
- Noisy Leakage Revisited
- Leaked-state-forgery attack against the authenticated encryption algorithm ALE
- Functional encryption: origins and recent developments
- Practical homomorphic MACs for arithmetic circuits
- Chinese remaindering based cryptosystems in the presence of faults
- Practical signatures from standard assumptions
- Homomorphic authenticated encryption secure against chosen-ciphertext attack
- Practical bootstrapping in quasilinear time
- Secure multi-party computation with identifiable abort
- Cryptanalysis of FIDES
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- KDM-CCA Security from RKA Secure Authenticated Encryption
- Leakage-tolerant computation with input-independent preprocessing
- Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware
- Side channel cryptanalysis of product ciphers
- Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
- Symmetric-key cryptosystem with DNA technology
- Asymmetric encryption and signature method with DNA technology
- Title not available (Why is that?)
- Cryptography with Streaming Algorithms
- Low probability differentials and the cryptanalysis of full-round CLEFIA-128
- On the semantic security of functional encryption schemes
- Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
Cited In (6)
Uses Software
This page was built for publication: Survey of information security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2385398)