Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
54
views
11
references
Top references
cited by
18
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,645
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
other
Author(s):
Jean-Sébastien Coron
,
Craig Gentry
,
Shai Halevi
,
Tancrède Lepoint
,
Hemanta K. Maji
,
Eric Miles
,
Mariana Raykova
,
Amit Sahai
,
Mehdi Tibouchi
Publication date
(Online):
August 1 2015
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Studia z Filologii Polskiej i Słowiańskiej
Most cited references
11
Record
: found
Abstract
: not found
Book Chapter
: not found
Candidate Multilinear Maps from Ideal Lattices
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
(2013)
0
comments
Cited
83
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Practical Multilinear Maps over the Integers
Jean-Sébastien Coron
,
Tancrède Lepoint
,
Mehdi Tibouchi
(2013)
0
comments
Cited
59
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Cryptanalysis of the Multilinear Map over the Integers
Jung Cheon
,
Kyoohyung Han
,
Changmin Lee
…
(2015)
0
comments
Cited
28
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2015
Publication date (Online):
August 1 2015
Pages
: 247-266
DOI:
10.1007/978-3-662-47989-6_12
SO-VID:
56983114-f97b-4f9a-8005-8ca83b36fbce
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing
pp. 23
Coded-BKW: Solving LWE Using Lattice Codes
pp. 43
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
pp. 63
Provably Weak Instances of Ring-LWE
pp. 95
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
pp. 116
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
pp. 141
Capacity and Data Complexity in Multidimensional Linear Attack
pp. 161
Observations on the SIMON Block Cipher Family
pp. 189
Tweaking Even-Mansour Ciphers
pp. 209
Multi-key Security: The Even-Mansour Construction Revisited
pp. 224
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
pp. 247
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
pp. 267
New Multilinear Maps Over the Integers
pp. 287
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation
pp. 308
Indistinguishability Obfuscation from Compact Functional Encryption
pp. 329
Efficient Pseudorandom Functions via On-the-Fly Adaptation
pp. 351
The Iterated Random Permutation Problem with Applications to Cascade Encryption
pp. 368
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC
pp. 388
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
pp. 413
Integral Cryptanalysis on Full MISTY1
pp. 433
New Attacks on Feistel Structures with Improved Memory Complexities
pp. 455
Known-Key Distinguisher on Full PRESENT
pp. 475
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes
pp. 493
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
pp. 518
Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More
pp. 538
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations
pp. 561
Cryptanalysis of the Co-ACD Assumption
pp. 601
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees
pp. 623
Practical Free-Start Collision Attacks on 76-step SHA-1
pp. 643
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0
pp. 663
Cryptanalysis of Full Sprout
pp. 683
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
pp. 705
Decaf: Eliminating Cofactors Through Point Compression
pp. 724
Actively Secure OT Extension with Optimal Overhead
pp. 742
Algebraic Decomposition for Probing Security
pp. 764
Consolidating Masking Schemes
Similar content
2,645
Carbon Net-Zero by 2050: Benefits, Challenges and Way Forward
Authors:
Hemanthi Ranasinghe
Primary User Emulation in Cognitive Radio-Enabled WSNs for Structural Health Monitoring: Modeling and Attack Detection
Authors:
Hassel Aurora Alcala’ Garrido
,
Mario E. Rivero-Angeles
,
Eleazar Aguirre Anaya
Mapping the Relative Risk of Congenital Hypothyroidism Incidence via Spatial Zero-Inflated Poisson Model in Guilan Province, Iran
Authors:
Bahare Gholami Chaboki
,
Manijeh TABRIZI
,
Maryam Heydarpour Meymeh
…
See all similar
Cited by
18
Practical Order-Revealing Encryption with Limited Leakage
Authors:
Nathan Chenette
,
Kevin Lewi
,
Stephen A. Weis
…
New Multilinear Maps Over the Integers
Authors:
Jean-Sébastien Coron
,
Tancrède Lepoint
,
Mehdi Tibouchi
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes
Authors:
Huijia Lin
See all cited by