The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ASIACRYPT"( http://dblp.L3S.de/Venues/ASIACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiacrypt

Publication years (Num. hits)
1990-1991 (47) 1993-1994 (37) 1995-1996 (36) 1998 (34) 1999 (33) 2000 (48) 2001 (35) 2002 (37) 2003 (34) 2004 (38) 2005 (38) 2006 (31) 2007 (36) 2008 (35) 2009 (42) 2010 (36) 2011 (41) 2012 (46) 2020 (1)
Publication types (Num. hits)
inproceedings(665) proceedings(20)
Venues (Conferences, Journals, ...)
ASIACRYPT(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 431 occurrences of 269 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Melissa Chase, Seny Kamara Structured Encryption and Controlled Disclosure. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard The World Is Not Enough: Another Look on Second-Order DPA. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Carmit Hazay, Tomas Toft Computationally Secure Pattern Matching in the Presence of Malicious Adversaries. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan The Round Complexity of Verifiable Secret Sharing: The Statistical Case. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Orr Dunkelman, Nathan Keller, Adi Shamir Improved Single-Key Attacks on 8-Round AES-192 and AES-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Damien Stehlé, Ron Steinfeld Faster Fully Homomorphic Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eric Brier, Thomas Peyrin A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Onur Özen, Martijn Stam Collision Attacks against the Knudsen-Preneel Compression Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chao Ning, Qiuliang Xu Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eike Kiltz, Krzysztof Pietrzak Leakage Resilient ElGamal Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aniket Kate, Gregory M. Zaverucha, Ian Goldberg Constant-Size Commitments to Polynomials and Their Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk Generic Compilers for Authenticated Key Exchange. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Emmanuel Volte, Valérie Nachef, Jacques Patarin Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, Dengguo Feng A Byte-Based Guess and Determine Attack on SOSEMANUK. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alon Rosen, Abhi Shelat Optimistic Concurrent Zero Knowledge. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vivien Dubois, Nicolas Gama The Degree of Regularity of HFE Systems. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Qiushi Yang, Yvo Desmedt General Perfectly Secure Message Transmission Using Linear Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro Random Oracles with(out) Programmability. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang Efficient String-Commitment from Weak Bit-Commitment. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Emiliano De Cristofaro, Jihye Kim, Gene Tsudik Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Markus Rückert Lattice-Based Blind Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Masayuki Abe (eds.) Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tibor Jager, Jörg Schwenk On the Analysis of Cryptographic Assumptions in the Generic Ring Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer Rebound Attack on the Full Lane Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3
1Zongyang Zhang, Zhenfu Cao, Ning Ding 0001, Rong Ma Non-malleable Statistically Hiding Commitment from Any One-Way Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie, Phong Q. Nguyen Factoring pq2 with Quadratic Forms: Nice Cryptanalyses. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Factorisation, Binary Quadratic Forms, Homogeneous Coppersmith’s Root Finding, Lattices, Public-key Cryptanalysis
1Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Vinod Vaikuntanathan Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa Efficient Public Key Encryption Based on Ideal Lattices. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Miyako Ohkubo A Framework for Universally Composable Non-committing Blind Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anja Lehmann, Stefano Tessaro A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer Rebound Distinguishers: Results on the Full Whirlpool Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, distinguisher, near-collision
1Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 Preimages for Step-Reduced SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256
1Kaoru Kurosawa, Ryo Nojima Simple Adaptive Oblivious Transfer without Random Oracle. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adaptive OT, Fully Simulatable, DDH, Standard Model
1Alex Biryukov, Dmitry Khovratovich Related-Key Cryptanalysis of the Full AES-192 and AES-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES, related-key attack, boomerang attack
1Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung Secure Multi-party Computation Minimizing Online Rounds. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Computing with Encrypted Data, Universal Composition, Cryptographic Protocols, Public key Cryptography, Multi-Party Computation
1Jean-Sébastien Coron, Avradip Mandal PSS Is Secure against Random Fault Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Probabilistic Signature Scheme, Provable Security, Fault Attacks, Bellcore Attack
1Jonathan Katz, Vinod Vaikuntanathan Signature Schemes with Bounded Leakage Resilience. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varici Improved Cryptanalysis of Skein. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin Linearization Framework for Collision Attacks: Application to CubeHash and MD6. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CubeHash and MD6, Hash functions, collisions, differential attack, SHA-3
1Mitsuru Matsui (eds.) Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Seny Kamara, Jonathan Katz Proofs of Storage from Homomorphic Identification Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Gazi, Ueli M. Maurer Cascade Encryption Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cascade encryption, random system, indistinguishability, ideal cipher model
1Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Indifferentiability, Merkle-Damgård hash function, Variants of Random Oracle, Cryptosystems Security
1Billy Bob Brumley, Risto M. Hakala Cache-Timing Template Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cache-timing attacks, elliptic curve cryptography, side channel attacks
1Ryad Benadjila, Olivier Billet, Shay Gueron, Matthew J. B. Robshaw The Intel AES Instructions Set and the SHA-3 Candidates. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Louis Salvail, Christian Schaffner, Miroslava Sotáková On the Power of Two-Party Quantum Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF two-party primitives, quantum protocols, oblivious transfer, quantum information theory
1Ivan Damgård, Carolin Lunemann Quantum-Secure Coin-Flipping and Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF common reference string, quantum zero-knowledge, quantum cryptography, coin-flipping
1Mathias Herrmann, Alexander May 0001 Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF small roots, lattices, power generator, systems of equations
1Hoeteck Wee Zero Knowledge in the Random Oracle Model, Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sequential composition, zero-knowledge, obfuscation, random oracle model
1Liqun Chen 0002, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi Security Notions and Generic Constructions for Client Puzzles. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Nigel P. Smart, Stephen C. Williams Secure Two-Party Computation Is Practical. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation
1Florian Mendel, Christian Rechberger, Martin Schläffer MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, combiner, differential, MD5
1Vadim Lyubashevsky Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto, Katsuyuki Takashima Hierarchical Predicate Encryption for Inner-Products. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Julien Cathalo, Benoît Libert, Moti Yung Group Encryption: Non-interactive Realization in the Standard Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group encryption, anonymity, provable security
1Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi Foundations of Non-malleable Hash and One-Way Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Antoine Joux, Stefan Lucks Improved Generic Algorithms for 3-Collisions. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multicollision, random map, memory-efficient, cryptanalysis, parallel implementation
1Olivier Billet, Gilles Macario-Rat Cryptanalysis of the Square Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xiaorui Sun, Xuejia Lai The Key-Dependent Attack on Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-Dependent Attack, Block Cipher, IDEA
1Matthieu Finiasz, Nicolas Sendrier Security Bounds for the Design of Code-Based Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF computational syndrome decoding, information set decoding, generalized birthday algorithm
1Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev 0001, Hovav Shacham, Scott Yilek Hedged Public-Key Encryption: How to Protect against Bad Randomness. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Arkady Yerukhimovich On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Dominique Unruh Limits of Constructive Security Proofs. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Matthew Green 0001, Susan Hohenberger Universally Composable Adaptive Oblivious Transfer. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Claude Carlet, Keqin Feng An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Boolean function, Stream cipher, Algebraic attack
1Hovav Shacham, Brent Waters Compact Proofs of Retrievability. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Jin Hong 0001, Minkyu Kim Speeding Up the Pollard Rho Method on Prime Fields. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pollard rho, r-adding walk, prime field, discrete logarithm problem
1Jung-Keun Lee, Dong Hoon Lee 0002, Sangwoo Park Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sosemanuk, SNOW 2.0, linear mask, stream cipher, correlation attack
1Ueli M. Maurer, Stefano Tessaro Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kan Yasuda How to Fill Up Merkle-Damgård Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding
1Xavier Pujol, Damien Stehlé Rigorous and Efficient Short Lattice Vectors Enumeration. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SVP, lattice cryptanalysis, Lattices, numerical stability
1Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF strongly multiplicative linear secret sharing scheme, secure multi-party computation, monotone span program
1Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Generic Group Model, Hardness Conditions, Lower Bounds, Straight-Line Programs
1Jan Camenisch, Rafik Chaabouni, Abhi Shelat Efficient Protocols for Set Membership and Range Proofs. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Range proofs, set membership proofs, bi-linear maps, proofs of knowledge
1Mathias Herrmann, Alexander May 0001 Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF small roots, factoring with known bits, Lattices
1Orr Dunkelman, Nathan Keller A New Attack on the LEX Stream Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream cipher design, AES, LEX
1Martin Hirt, Ueli M. Maurer, Vassilis Zikas MPC vs. SFE : Unconditional and Computational Security. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson Twisted Edwards Curves Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Efficient elliptic curve arithmetic, unified addition, side channel attack, SPA
1Yu Sasaki, Kazumaro Aoki Preimage Attacks on 3, 4, and 5-Pass HAVAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF splice-and-cut, hash function, preimage, one-way, meet-in-the-middle, local collision, HAVAL
1Josef Pieprzyk (eds.) Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Paul Morrissey, Nigel P. Smart, Bogdan Warinschi A Modular Security Analysis of the TLS Handshake Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Qiong Huang 0001, Guomin Yang, Duncan S. Wong, Willy Susilo Ambiguous Optimistic Fair Exchange. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Kaoru Kurosawa Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Khaled Ouafi, Raphael Overbeck, Serge Vaudenay On the Security of HB# against a Man-in-the-Middle Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HB, RFID, authentication protocols
1Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Chosen Ciphertext Security with Optimal Ciphertext Overhead. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michael Gorski, Stefan Lucks, Thomas Peyrin Slide Attacks on a Class of Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grindahl, RadioGatún, sponge function, MAC, hash function, slide attacks
1Orr Dunkelman, Nathan Keller An Improved Impossible Differential Attack on MISTY1. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Manoj Prabhakaran 0001, Mike Rosulek Towards Robust Computation on Encrypted Data. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Christian Schridde, Bernd Freisleben On the Validity of the phi-Hiding Assumption in Cryptographic Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ?-Hiding assumption, Jacobi symbol, Euler’s totient function
1Xiaoming Sun 0001, Andrew Chi-Chih Yao, Christophe Tartary Graph Design for Secure Multiparty Computation over Non-Abelian Groups. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Graph Coloring, Multiparty Computation, Percolation Theory, Non-Abelian Groups, Passive Adversary
1Michael Backes 0001, Markus Dürmuth, Dominique Unruh OAEP Is Secure under Key-Dependent Messages. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key-dependent message security, RSA-OAEP, chosen ciphertext attacks
1Mihir Bellare, Todor Ristov Hash Functions from Sigma Protocols and Improvements to VSH. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Akinori Kawachi, Keisuke Tanaka, Keita Xagawa Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF concurrent security, ad hoc anonymous identification schemes, identification schemes, Lattice-based cryptography
1Martin Hell, Thomas Johansson 0001 Breaking the F-FCSR-H Stream Cipher in Real Time. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Andrew Chi-Chih Yao Some Perspectives on Complexity-Based Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Michael Hamburg Generalized Identity Based and Broadcast Encryption Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license