Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
6
views
23
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,084
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Cryptology and Network Security: 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings
SETLA: Signature and Encryption from Lattices
other
Author(s):
François Gérard
,
Keno Merckx
Publication date
(Online):
September 01 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
23
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
210
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis
,
Leonid Reyzin
,
Adam Smith
(2004)
0
comments
Cited
140
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption)
Yuliang Zheng
(1997)
0
comments
Cited
61
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
September 01 2018
Pages
: 299-320
DOI:
10.1007/978-3-030-00434-7_15
SO-VID:
f1adbe77-fb18-443e-927e-c17ca6370e24
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Identity Recognition by Incremental Learning
pp. 3
Faster Privacy-Preserving Location Proximity Schemes
pp. 5
Modern Approaches to Multi-dimensional Visual Signals Analysis
pp. 7
New Applications of Sound and Vision Engineering
pp. 13
A Concept of Visual Knowledge Representation
pp. 23
Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach
pp. 23
Three-Dimensional Multi-resolution and Hardware Accelerated Compression for the Efficient Interactive Web Applications
pp. 35
Using the Virtual Assistant Alexa as a Communication Channel for Road Traffic Situation
pp. 43
$$\mathsf {HIKE}$$ : Walking the Privacy Trail
pp. 45
Application of the Sensor Fusion for the System to Track Human Upper Limb Motion
pp. 56
Estimation of the Amount of Noise in Digital Images Using Finite Differences
pp. 67
Linear Filtering of Blurry Photos
pp. 69
DNS-DNS: DNS-Based De-NAT Scheme
pp. 77
A First Summarization System of a Video in a Target Language
pp. 89
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core
pp. 89
Comparative Analysis of Accuracy of Fuzzy Clustering Methods Applied for Image Processing
pp. 99
An Efficient Method for Sign Language Recognition from Image Using Convolutional Neural Network
pp. 109
Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing Pipeline
pp. 109
Audio/Speech Coding Based on the Perceptual Sparse Representation of the Signal with DAE Neural Network Quantizer and Near-End Listening Enhancement
pp. 120
The Features and Functions of an Effective Multimedia Information Retrieval System (MMIR)
pp. 131
YouTube Timed Metadata Enrichment Using a Collaborative Approach
pp. 133
Malware Tolerant (Mesh-)Networks
pp. 142
Improving the Responsiveness of Geospatial Web Applications Through Client-Side Processing
pp. 151
Isotone Galois Connections and Generalized One-Sided Concept Lattices
pp. 154
Inside GandCrab Ransomware
pp. 161
Transfer Learning in GMDH-Type Neural Networks
pp. 170
Modelling of Taxi Dispatch Problem Using Heuristic Algorithms
pp. 177
The Relation Between CENC and NEMO
pp. 180
Malware Detection Using Black-Box Neural Method
pp. 190
On the Efficiency of ZMAC-Type Modes
pp. 190
Intrusion Detection and Risk Evaluation in Online Transactions Using Partitioning Methods
pp. 201
Prediction of Autism Severity Level in Bangladesh Using Fuzzy Logic: FIS and ANFIS
pp. 213
Hierarchical Attribute-Based Signatures
pp. 213
A Framework for Analyzing Academic Data
pp. 224
Verifying Usefulness of Algorithms for WordNet Based Similarity Sense Disambiguation
pp. 235
Enhanced Security of Attribute-Based Signatures
pp. 236
Comparison of Paragram and Glove Results for Similarity Benchmarks
pp. 249
Calculating Optimal Queries from the Query Relevance File
pp. 256
Protean Signature Schemes
pp. 260
Survey on Neural Machine Translation into Polish
pp. 273
Multilingual and Intercultural Competence for ICT: Accessing and Assessing Electronic Information in the Global World
pp. 277
Code-Based Signature Schemes from Identification Protocols in the Rank Metric
pp. 279
Selection of Most Suitable Secondary School Alternative by Multi-Criteria Fuzzy Analytic Hierarchy Process
pp. 290
Comparison of the Novel Classification Methods on the Reuters-21578 Corpus
pp. 299
SETLA: Signature and Encryption from Lattices
pp. 303
Deep Learning Techniques for Visual Food Recognition on a Mobile App
pp. 313
To Identify Hot Spots in Power Lines Using Infrared and Visible Sensors
pp. 322
Sparse Solution to Inverse Problem of Nonlinear Dimensionality Reduction
pp. 323
Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes
pp. 332
Towards Structural Monitoring and 3D Documentation of Architectural Heritage Using UAV
pp. 343
Remote Sensing for Maritime Monitoring and Vessel Prompt Identification
pp. 344
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project
pp. 353
Deep Learning Approach to Human Osteosarcoma Cell Detection and Classification
pp. 357
Solving LWR via BDD Strategy: Modulus Switching Approach
pp. 362
Detection of Suspicious Accounts on Twitter Using Word2Vec and Sentiment Analysis
pp. 372
A Hybrid CNN Approach for Single Image Depth Estimation: A Case Study
pp. 377
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation
pp. 385
Cross-Lingual Speech-to-Text Summarization
pp. 394
Several MILP-Aided Attacks Against SNOW 2.0
pp. 396
A Proposed Methodology for Subjective Evaluation of Video and Text Summarization
pp. 405
Collection, Analysis and Summarization of Video Content
pp. 415
An Integrated AMIS Prototype for Automated Summarization and Translation of Newscasts and Reports
pp. 417
Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
pp. 424
Evaluation of Multimedia Content Summarization Algorithms
pp. 434
A Knowledge Discovery from Full-Text Document Collections Using Clustering and Interpretable Genetic-Fuzzy Systems
pp. 440
Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
pp. 444
Microservices Architecture for Content-Based Indexing of Video Shots
pp. 459
Spatial Audio Scene Characterization (SASC)
pp. 463
Secret Sharing Schemes for (k, n)-Consecutive Access Structures
pp. 470
Automatic Clustering of EEG-Based Data Associated with Brain Activity
pp. 480
Comparative Analysis of Spectral and Cepstral Feature Extraction Techniques for Phoneme Modelling
pp. 481
Extending a Framework for Biometric Visual Cryptography
pp. 490
Selection of Features for Multimodal Vocalic Segments Classification
pp. 495
Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework
pp. 503
Weight Adaptation Stability of Linear and Higher-Order Neural Units for Prediction Applications
pp. 512
Visual Analysis of Differential Evolution Algorithms
pp. 522
PCA Algorithms in the Visualization of Big Data from Polish Digital Libraries
pp. 533
Recognition of the Pathology of the Human Movement with the Use of Mobile Technology and Machine Learning
pp. 542
A Multimedia Platform for Mexican Cultural Heritage Diffusion
pp. 552
Authentication Mechanism to Access Multiple-Domain Multimedia Data
pp. 565
Accident Prevention System During Immersion in Virtual Reality
pp. 574
Design and Development of “Battle Drone” Computer-Based Trading Card Game (CTCG)
pp. 586
Wide Field of View Projection Using Rasterization
Similar content
2,084
Generating visually secure encrypted images by partial block pairing-substitution and semi-tensor product compressed sensing
Authors:
Ping Ping
,
Xiaohui Yang
,
Xiaojuan Zhang
…
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm
Authors:
Alaa E.A. Omar
,
Salah M.A. Kholaif
,
Hadia El Hennawy
A Chaotic Image Encryption Method Based on the Artificial Fish Swarms Algorithm and the DNA Coding
Authors:
Yue Zhu
,
Chunhua Wang
,
Jingru Sun
…
See all similar
Cited by
1
Lattice-based signcryption with equality test in standard model
Authors:
Huy Quoc Le
,
Dung Duong
,
Partha Roy
…
See all cited by