Search

Your search keyword '"Lauter, Kristin"' showing total 73 results

Search Constraints

Start Over You searched for: Author "Lauter, Kristin" Remove constraint Author: "Lauter, Kristin" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
73 results on '"Lauter, Kristin"'

Search Results

1. Homomorphic Computation of Edit Distance

2. Provably Weak Instances of Ring-LWE

3. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme

4. High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition

5. Fast Cryptography in Genus 2

6. ML Confidential: Machine Learning on Encrypted Data

7. Affine Pairings on ARM

8. Group Law Computations on Jacobians of Hyperelliptic Curves

9. Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings

10. An Analysis of Affine Coordinates for Pairing Computation

11. Cryptographic Cloud Storage

12. The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences

13. Full Cryptanalysis of LPS and Morgenstern Hash Functions

14. Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group

15. Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography

16. Computing Hilbert Class Polynomials

17. Stronger Security of Authenticated Key Exchange

18. Security Analysis of KEA Authenticated Key Exchange Protocol

19. Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves

36. Implementing Lightweight Block Ciphers on x86 Architectures

37. Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA

38. Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5

39. A New Index Calculus Algorithm with Complexity in Small Characteristic

40. White-Box Security Notions for Symmetric Encryption Schemes

41. Two Attacks on a White-Box AES Implementation

42. Horizontal Collision Correlation Attack on Elliptic Curves

43. Extended Generalized Feistel Networks Using Matrix Representation

44. The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE

45. Fast Exhaustive Search for Quadratic Systems in on FPGAs

46. Faster Hash-Based Signatures with Bounded Leakage

47. How to Recover Any Byte of Plaintext on RC4

48. Solving a -bit DLP on a Desktop Computer

49. A Group Action on and the Generalized DLP with Auxiliary Inputs

50. AEGIS: A Fast Authenticated Encryption Algorithm

Catalog

Books, media, physical & digital resources