Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307273

DOI10.1007/b97182zbMath1122.94368OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307273

No author found.

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182




Related Items (68)

SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsRobustly reusable fuzzy extractor with imperfect randomnessTwo-message statistically sender-private OT from LWELWE without modular reduction and improved side-channel attacks against BLISSThe generic construction of continuous leakage-resilient identity-based cryptosystemsVariable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFsSimpler CCA-Secure Public Key Encryption from Lossy Trapdoor FunctionsPseudoentropy: Lower-Bounds for Chain Rules and TransformationsAnalysis and protection of the two-metric helper data schemeDeniable Attribute Based Encryption for Branching Programs from LWEPrecision Statistics: Fractional Number of Degrees of Freedom Chi-Square Criterion for Small Samples of Biometric DataA generic construction of fuzzy signatureRobust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacyEfficient cryptosystems from \(2^k\)-th power residue symbolsIncompressible cryptographyObfuscated fuzzy Hamming distance and conjunctions from subset product problemsThe Chain Rule for HILL Pseudoentropy, RevisitedSecurity Analysis of PRINCEInformation Theoretic Security for Encryption Based on Conditional Rényi EntropiesOn the leakage-resilient key exchangeDetecting Algebraic Manipulation in Leaky Storage SystemsPublic-key encryption scheme with optimal continuous leakage resilienceSimple Codes and Sparse Recovery with Fast DecodingSETLA: Signature and Encryption from LatticesWorst-case subexponential attacks on PRGs of constant degree or constant localityLeakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled CircuitsUnnamed ItemLockable obfuscation from circularly insecure fully homomorphic encryptionA theoretical framework for the analysis of physical unclonable function interfaces and its relation to the random oracle modelProvably secure certificate-based encryption with leakage resilienceNon-interactive zero-knowledge from non-interactive batch argumentsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityCircular security is complete for KDM securityFuzzy asymmetric password-authenticated key exchangePassword Mistyping in Two-Factor-Authenticated Key ExchangeComputational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropyDirect computation of branching programs and its applications to more efficient lattice-based cryptographyRobustly reusable fuzzy extractor from standard assumptionsBounded-Retrieval Model with Keys Derived from Private DataLeakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability ObfuscationSecure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKALossy Key Encapsulation Mechanism and Its ApplicationsA PUF and Software Collaborative Key Protection SchemeTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingО безопасности схемы биометрической аутентификации, основанной на нейронной сетиPseudorandom functions in NC class from the standard LWE assumptionA generic construction of CCA-secure deterministic encryptionHiding Secret Points Amidst ChaffEfficient Binary Conversion for Paillier Encrypted ValuesA Signature Scheme with a Fuzzy Private KeymrPUF: A Novel Memristive Device Based Physical Unclonable FunctionNovel updatable identity-based hash proof system and its applicationsReusable fuzzy extractor from the decisional Diffie-Hellman assumptionTighter security proofs for GPV-IBE in the quantum random oracle modelIdentity-based encryption with leakage-amplified chosen-ciphertext attacks securityPrivacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing AttacksData recovery for a neural network-based biometric authentication schemeLeakage-resilient biometric-based remote user authentication with fuzzy extractorsMultiparty reusable non-interactive secure computation from LWEQuantitative Information Flow and Applications to Differential PrivacyOn selective-opening security of deterministic primitivesBETA: biometric-enabled threshold authenticationFHE Circuit Privacy Almost for FreeWildcarded identity-based encryption from latticesEfficient Threshold Encryption from Lossy Trapdoor FunctionsA novel fuzzy vault scheme based on fingerprint and finger vein feature fusionContinuous leakage-resilient identity-based encryption with leakage amplificationSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption




This page was built for publication: Advances in Cryptology - EUROCRYPT 2004