Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 91
1.
  • Leakage-Abuse Attacks Again... Leakage-Abuse Attacks Against Searchable Encryption
    Cash, David; Grubbs, Paul; Perry, Jason ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 10/2015
    Conference Proceeding

    Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the literature, schemes for accomplishing this efficiently are called Searchable ...
Celotno besedilo
Dostopno za: NUK, UL
2.
Celotno besedilo

PDF
3.
  • Simulation without the Arti... Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
    Bellare, Mihir; Ristenpart, Thomas Advances in Cryptology - EUROCRYPT 2009
    Book Chapter
    Recenzirano
    Odprti dostop

    Waters’ variant of the Boneh-Boyen IBE scheme is attractive because of its efficency, applications, and security attributes, but suffers from a relatively complex proof with poor concrete security. ...
Celotno besedilo

PDF
4.
  • Hash Functions in the Dedic... Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
    Bellare, Mihir; Ristenpart, Thomas Automata, Languages and Programming
    Book Chapter
    Recenzirano

    In the dedicated-key setting, one uses a compression function f:{0,1}k × {0,1}n + d →{0,1}n to build a family of hash functions \documentclass12pt{minimal} \usepackage{amsmath} \usepackage{wasysym} ...
Celotno besedilo
5.
  • Model Inversion Attacks tha... Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
    Fredrikson, Matt; Jha, Somesh; Ristenpart, Thomas Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 10/2015
    Conference Proceeding
    Odprti dostop

    Machine-learning (ML) algorithms are increasingly utilized in privacy-sensitive applications such as predicting lifestyle choices, making medical diagnoses, and facial recognition. In a model ...
Celotno besedilo
Dostopno za: NUK, UL
6.
  • The Power of Proofs-of-Poss... The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
    Ristenpart, Thomas; Yilek, Scott Advances in Cryptology - EUROCRYPT 2007
    Book Chapter
    Recenzirano
    Odprti dostop

    Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only ...
Celotno besedilo

PDF
7.
  • Deterministic Encryption: D... Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
    Bellare, Mihir; Fischlin, Marc; O’Neill, Adam ... Advances in Cryptology – CRYPTO 2008
    Book Chapter
    Recenzirano
    Odprti dostop

    We strengthen the foundations of deterministic public-key encryption via definitional equivalences and standard-model constructs based on general assumptions. Specifically we consider seven notions ...
Celotno besedilo

PDF
8.
Celotno besedilo

PDF
9.
  • Hedged Public-Key Encryptio... Hedged Public-Key Encryption: How to Protect against Bad Randomness
    Bellare, Mihir; Brakerski, Zvika; Naor, Moni ... Advances in Cryptology – ASIACRYPT 2009
    Book Chapter
    Recenzirano
    Odprti dostop

    Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, leading to failure of the ...
Celotno besedilo

PDF
10.
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
1 2 3 4 5
zadetkov: 91

Nalaganje filtrov