Survey of information security
From MaRDI portal
Publication:2385398
Recommendations
- Publication:4502754
- Security and protection in information processing systems. IFIP 18th world computer congress, TC11 19th international information security conference, 22--27 August 2004, Toulouse, France.
- Information security, mathematics, and public-key cryptography
- Mathematical and computer modelling in information system security
- Handbook of information and communication security
Cites work
- scientific article; zbMATH DE number 1612515 (Why is no real title available?)
- scientific article; zbMATH DE number 4053065 (Why is no real title available?)
- scientific article; zbMATH DE number 1951616 (Why is no real title available?)
- scientific article; zbMATH DE number 1869495 (Why is no real title available?)
- scientific article; zbMATH DE number 1878336 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- (Hierarchical) identity-based encryption from affine message authentication
- (Leveled) fully homomorphic encryption without bootstrapping
- (Leveled) fully homomorphic encryption without bootstrapping
- A Framework for Efficient and Composable Oblivious Transfer
- A simplified representation of AES
- A survey on fast correlation attacks
- ALE: AES-based lightweight authenticated encryption
- An overview of distinguishing attacks on stream ciphers
- Applying cube attacks to stream ciphers in realistic scenarios
- Asymmetric encryption and signature method with DNA technology
- Authenticated key exchange from ideal lattices
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Behind the scene of side channel attacks
- Block ciphers -- focus on the linear layer (feat. PRIDE)
- Bonsai trees, or how to delegate a lattice basis
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Certificateless public key cryptography
- Chinese remaindering based cryptosystems in the presence of faults
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Concurrent knowledge extraction in public-key models
- Constant-round concurrent zero knowledge in the bounded player model
- Cryptanalysis of FIDES
- Cryptanalysis of HMAC/NMAC-Whirlpool
- Cryptanalysis of SP networks with partial non-linear layers
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- Cryptanalysis of the Xiao-Lai white-box AES implementation
- Cryptanalysis of the multilinear map over the integers
- Cryptography with Streaming Algorithms
- Differential Privacy
- Efficient Collision Search Attacks on SHA-0
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient fully homomorphic encryption from (standard) LWE
- Efficient identity-based encryption over NTRU lattices
- FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
- Faster Bootstrapping with Polynomial Error
- Finding Collisions in the Full SHA-1
- Forging attacks on two authenticated encryption schemes COBRA and POET
- Full text retrieval based on syntactic similarities
- Fully homomorphic encryption using ideal lattices
- Function secret sharing
- Functional encryption: origins and recent developments
- Further Results on the Decomposition of an NFSR Into the Cascade Connection of an NFSR Into an LFSR
- Further results on the distinctness of modulo 2 reductions of primitive sequences over \(\mathbb{Z}/(2^{32}-1)\)
- Fuzzy Identity-Based Encryption
- Generic Related-Key Attacks for HMAC
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- High order differential attacks on stream ciphers
- Homomorphic authenticated encryption secure against chosen-ciphertext attack
- How to Break MD5 and Other Hash Functions
- How to securely release unverified plaintext in authenticated encryption
- How to use indistinguishability obfuscation
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Implementation of real-time constrained linear discriminant analysis to remote sensing image classification
- Improved dual system ABE in prime-order groups via predicate encodings
- Information-theoretic analysis of information hiding
- Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
- KDM-CCA Security from RKA Secure Authenticated Encryption
- LBlock: a lightweight block cipher
- Lattice signatures and bimodal Gaussians
- Lattice signatures without trapdoors
- Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Leakage-tolerant computation with input-independent preprocessing
- Leaked-state-forgery attack against the authenticated encryption algorithm ALE
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- Low overhead broadcast encryption from multilinear maps
- Low probability differentials and the cryptanalysis of full-round CLEFIA-128
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- More efficient oblivious transfer extensions with security for malicious adversaries
- New generic attacks against hash-based MACs
- Noisy leakage revisited
- Non-interactive secure multiparty computation
- Non-interactive zero-knowledge proofs in the quantum random oracle model
- On ideal lattices and learning with errors over rings
- On lattices, learning with errors, random linear codes, and cryptography
- On the (im)possibility of obfuscating programs
- On the semantic security of functional encryption schemes
- Optimal non-perfect uniform secret sharing schemes
- PRESENT: An Ultra-Lightweight Block Cipher
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Practical aspects of measurement-device-independent quantum key distribution
- Practical bootstrapping in quasilinear time
- Practical homomorphic MACs for arithmetic circuits
- Practical signatures from standard assumptions
- Public-key cryptosystems from the worst-case shortest vector problem
- Quantum cryptography using any two nonorthogonal states
- Quasi-adaptive NIZK for linear subspaces revisited
- Replacing a random oracle: full domain hash from indistinguishability obfuscation
- Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
- Robust authenticated-encryption AEZ and the problem that it solves
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- Round-efficient black-box construction of composable multi-party computation
- SWIFFT: A Modest Proposal for FFT Hashing
- Secure lightweight entity authentication with strong PUFs: Mission impossible?
- Secure multi-party computation with identifiable abort
- Side channel cryptanalysis of product ciphers
- Side-Channel Analysis of Multiplications in GF(2128)
- Simulatable leakage: analysis, pitfalls, and new constructions
- Survey of information security
- Symmetric-key cryptosystem with DNA technology
- The Bitcoin Backbone Protocol: Analysis and Applications
- The knowledge complexity of interactive proof-systems
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Trapdoors for hard lattices and new cryptographic constructions
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Updates on generic attacks against HMAC and NMAC
- Witness encryption and its applications
- Witness encryption from instance independent assumptions
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
Cited in
(6)- scientific article; zbMATH DE number 1504794 (Why is no real title available?)
- Theoretical aspects of information security
- Comparing two sets without disclosing them
- Survey of information security
- Theoretical research about information security system based on general system theory
- Information security as a resource
This page was built for publication: Survey of information security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2385398)