Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Shiho Moriai, Huaxiong Wang (eds.) |
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I |
ASIACRYPT |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Takaaki Mizuki, Michihito Kumamoto, Hideaki Sone |
The Five-Card Trick Can Be Done with Four Cards. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, François-Xavier Standaert |
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Longa, Francesco Sica 0001 |
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gerbush, Allison B. Lewko, Adam O'Neill, Brent Waters |
Dual Form Signatures: An Approach for Proving Security from Static Assumptions. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joppe W. Bos, Thorsten Kleinjung |
ECM at Work. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Kenneth G. Paterson, Susan Thomson 0001 |
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Viet Tung Hoang, Phillip Rogaway |
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo |
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shahram Khazaei, Tal Moran, Douglas Wikström |
A Mix-Net from Any CCA2 Secure Cryptosystem. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Liting Zhang, Wenling Wu, Han Sui, Peng Wang 0009 |
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Jain 0002, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes |
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Scott Ames, Rosario Gennaro, Muthuramakrishnan Venkitasubramaniam |
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nuttapong Attrapadung, Benoît Libert, Thomas Peters |
Computing on Authenticated Data: New Privacy Definitions and Constructions. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Lei Wang 0031, Shuang Wu 0004, Wenling Wu |
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Huijia Lin, Muthuramakrishnan Venkitasubramaniam |
A Unified Framework for UC from Only OT. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn |
A Coding-Theoretic Approach to Recovering Noisy RSA Keys. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gilad Asharov, Claudio Orlandi |
Calling Out Cheaters: Covert Security with Public Verifiability. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Léo Ducas, Phong Q. Nguyen |
Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jooyoung Lee 0001 |
Provable Security of the Knudsen-Preneel Compression Functions. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang |
Integral and Multidimensional Linear Distinguishers with Correlation Zero. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede |
Theory and Practice of a Leakage Resilient Masking Scheme. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dimitar Jetchev, Onur Özen, Martijn Stam |
Understanding Adaptivity: Random Systems Revisited. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rodolphe Lampe, Jacques Patarin, Yannick Seurin |
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Petit 0001, Jean-Jacques Quisquater |
On Polynomial Systems Arising from a Weil Descent. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bart Mennink |
Optimal Collision Security in Double Block Length Hashing with Single Length Key. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jae Hong Seo |
On the (Im)possibility of Projecting Property in Prime-Order Setting. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gaëtan Leurent |
Analysis of Differential Attacks in ARX Constructions. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel |
Signature Schemes Secure against Hard-to-Invert Leakage. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Bernhard, Olivier Pereira, Bogdan Warinschi |
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kyle Brogle, Sharon Goldberg, Leonid Reyzin |
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract). |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin |
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Peyrin, Yu Sasaki, Lei Wang 0031 |
Generic Related-Key Attacks for HMAC. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento |
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chuanming Zong |
Some Mathematical Mysteries in Lattices. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Katsuyuki Takashima |
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell, Eran Omri, Hila Zarosim |
Completeness for Symmetric Two-Party Functionalities - Revisited. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh |
Pairing-Based Cryptography: Past, Present, and Future. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyun Wang 0001, Kazue Sako (eds.) |
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Saqib A. Kakvi, Eike Kiltz, Alexander May 0001 |
Certifying RSA. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici |
Differential Analysis of the LED Block Cipher. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Luis Villar |
Optimal Reductions of Some Decisional Problems to the Rank Problem. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Léo Ducas, Phong Q. Nguyen |
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hongjun Wu 0001, Tao Huang 0015, Phuong Ha Nguyen, Huaxiong Wang, San Ling |
Differential Attacks against Stream Cipher ZUC. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Meicheng Liu, Yin Zhang, Dongdai Lin |
Perfect Algebraic Immune Functions. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Takuya Hayashi 0001, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi |
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397). |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Khovratovich |
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson 0001 |
On the Joint Security of Encryption and Signature, Revisited. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dong Hoon Lee 0001, Xiaoyun Wang (eds.) |
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Aggelos Kiayias, Tal Malkin |
BiTR: Built-in Tamper Resilience. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yi Deng 0002, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung |
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann 0001 |
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry |
Random Oracles in a Quantum World. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | María Naya-Plasencia, Deniz Toz, Kerem Varici |
Rebound Attack on JH42. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Tibor Jager, Eike Kiltz |
Short Signatures from Weaker Assumptions. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud |
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum |
Program Obfuscation with Leaky Hardware. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qiushi Yang, Yvo Desmedt |
Secure Communication in Multicast Graphs. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat |
Practical Key-Recovery for All Possible Parameters of SFLASH. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens |
Structure Preserving CCA Secure Encryption and Applications. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton |
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Divesh Aggarwal, Ueli Maurer |
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Claude Crépeau, Louis Salvail, Jean-Raymond Simard, Alain Tapp |
Two Provers in Isolation. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Stephan Krenn, Victor Shoup |
A Framework for Practical Universally Composable Zero-Knowledge Protocols. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Aniket Kate, Arpita Patra |
Computational Verifiable Secret Sharing Revisited. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Benoît Libert, Mark Manulis |
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Lior Malka |
Constant-Round Private Function Evaluation with Linear Complexity. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, David Cash, Rachel Miller |
Cryptography Secure against Related-Key Attacks and Tampering. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Mingfei Li |
Oblivious RAM with O((logN)3) Worst-Case Cost. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Raghav Bhaskar, Abhishek Bhowmick 0001, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta |
Noiseless Database Privacy. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi |
Lower and Upper Bounds for Deniable Public-Key Encryption. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Oriol Farràs, Carles Padró, Chaoping Xing, An Yang |
Natural Generalizations of Threshold Secret Sharing. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alexander May 0001, Alexander Meurer, Enrico Thomae |
Decoding Random Linear Codes in $\tilde{\mathcal{O}}(2^{0.054n})$. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Dziembowski, Sebastian Faust |
Leakage-Resilient Cryptography from the Inner-Product Extractor. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Frederik Armknecht, Ewan Fleischmann, Matthias Krause 0001, Jooyoung Lee 0001, Martijn Stam, John P. Steinberger |
The Preimage Security of Double-Block-Length Compression Functions. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Jens Groth, Miyako Ohkubo |
Separating Short Structure-Preserving Signatures from Non-interactive Assumptions. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger |
Biclique Cryptanalysis of the Full AES. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth |
Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan |
Functional Encryption for Inner Product Predicates from Learning with Errors. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pierrick Gaudry, David R. Kohel, Benjamin A. Smith |
Counting Points on Genus 2 Curves with Real Multiplication. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qianhong Wu, Bo Qin, Lei Zhang 0009, Josep Domingo-Ferrer, Oriol Farràs |
Bridging Broadcast Encryption and Group Key Agreement. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolic |
Second-Order Differential Collisions for Reduced SHA-256. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Tomislav Nad, Martin Schläffer |
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chao Ning, Qiuliang Xu |
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner |
Cryptanalysis of ARMADILLO2. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuanmi Chen, Phong Q. Nguyen |
BKZ 2.0: Better Lattice Security Estimates. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger |
On the Efficiency of Bit Commitment Reductions. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret |
Polly Cracker, Revisited. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Payman Mohassel |
A Closer Look at Anonymity and Robustness in Encryption Schemes. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth |
Short Non-interactive Zero-Knowledge Proofs. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi, Amit Sahai |
On Invertible Sampling and Adaptive Security. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan |
A Group Signature Scheme from Lattice Assumptions. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tibor Jager, Andy Rupp |
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs |
Efficient Public-Key Cryptography in the Presence of Key Leakage. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger |
Rotational Rebound Attacks on Reduced Skein. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth |
Short Pairing-Based Non-interactive Zero-Knowledge Arguments. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Fuhr 0001 |
Finding Second Preimages of Short Messages for Hamsi-256. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Robert Granger |
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Simon Knellwolf, Willi Meier, María Naya-Plasencia |
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Yang Li 0001, Lei Wang 0031, Kazuo Sakiyama, Kazuo Ohta |
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|