Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Melissa Chase, Seny Kamara |
Structured Encryption and Controlled Disclosure. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard |
The World Is Not Enough: Another Look on Second-Order DPA. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carmit Hazay, Tomas Toft |
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan |
The Round Complexity of Verifiable Secret Sharing: The Statistical Case. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Orr Dunkelman, Nathan Keller, Adi Shamir |
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Damien Stehlé, Ron Steinfeld |
Faster Fully Homomorphic Encryption. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Eric Brier, Thomas Peyrin |
A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman |
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Onur Özen, Martijn Stam |
Collision Attacks against the Knudsen-Preneel Compression Functions. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chao Ning, Qiuliang Xu |
Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Eike Kiltz, Krzysztof Pietrzak |
Leakage Resilient ElGamal Encryption. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aniket Kate, Gregory M. Zaverucha, Ian Goldberg |
Constant-Size Commitments to Polynomials and Their Applications. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk |
Generic Compilers for Authenticated Key Exchange. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Volte, Valérie Nachef, Jacques Patarin |
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, Dengguo Feng |
A Byte-Based Guess and Determine Attack on SOSEMANUK. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alon Rosen, Abhi Shelat |
Optimistic Concurrent Zero Knowledge. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vivien Dubois, Nicolas Gama |
The Degree of Regularity of HFE Systems. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Qiushi Yang, Yvo Desmedt |
General Perfectly Secure Message Transmission Using Linear Codes. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro |
Random Oracles with(out) Programmability. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang |
Efficient String-Commitment from Weak Bit-Commitment. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Emiliano De Cristofaro, Jihye Kim, Gene Tsudik |
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Markus Rückert |
Lattice-Based Blind Signatures. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe (eds.) |
Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tibor Jager, Jörg Schwenk |
On the Analysis of Cryptographic Assumptions in the Generic Ring Model. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer |
Rebound Attack on the Full Lane Compression Function. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3 |
1 | Zongyang Zhang, Zhenfu Cao, Ning Ding 0001, Rong Ma |
Non-malleable Statistically Hiding Commitment from Any One-Way Function. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie, Phong Q. Nguyen |
Factoring pq2 with Quadratic Forms: Nice Cryptanalyses. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Factorisation, Binary Quadratic Forms, Homogeneous Coppersmith’s Root Finding, Lattices, Public-key Cryptanalysis |
1 | Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls |
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Vinod Vaikuntanathan |
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa |
Efficient Public Key Encryption Based on Ideal Lattices. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Miyako Ohkubo |
A Framework for Universally Composable Non-committing Blind Signatures. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Anja Lehmann, Stefano Tessaro |
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer |
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, distinguisher, near-collision |
1 | Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 |
Preimages for Step-Reduced SHA-2. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256 |
1 | Kaoru Kurosawa, Ryo Nojima |
Simple Adaptive Oblivious Transfer without Random Oracle. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Adaptive OT, Fully Simulatable, DDH, Standard Model |
1 | Alex Biryukov, Dmitry Khovratovich |
Related-Key Cryptanalysis of the Full AES-192 and AES-256. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
AES, related-key attack, boomerang attack |
1 | Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung |
Secure Multi-party Computation Minimizing Online Rounds. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Computing with Encrypted Data, Universal Composition, Cryptographic Protocols, Public key Cryptography, Multi-Party Computation |
1 | Jean-Sébastien Coron, Avradip Mandal |
PSS Is Secure against Random Fault Attacks. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Probabilistic Signature Scheme, Provable Security, Fault Attacks, Bellcore Attack |
1 | Jonathan Katz, Vinod Vaikuntanathan |
Signature Schemes with Bounded Leakage Resilience. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varici |
Improved Cryptanalysis of Skein. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin |
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
CubeHash and MD6, Hash functions, collisions, differential attack, SHA-3 |
1 | Mitsuru Matsui (eds.) |
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Seny Kamara, Jonathan Katz |
Proofs of Storage from Homomorphic Identification Protocols. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peter Gazi, Ueli M. Maurer |
Cascade Encryption Revisited. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cascade encryption, random system, indistinguishability, ideal cipher model |
1 | Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta |
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Indifferentiability, Merkle-Damgård hash function, Variants of Random Oracle, Cryptosystems Security |
1 | Billy Bob Brumley, Risto M. Hakala |
Cache-Timing Template Attacks. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cache-timing attacks, elliptic curve cryptography, side channel attacks |
1 | Ryad Benadjila, Olivier Billet, Shay Gueron, Matthew J. B. Robshaw |
The Intel AES Instructions Set and the SHA-3 Candidates. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Louis Salvail, Christian Schaffner, Miroslava Sotáková |
On the Power of Two-Party Quantum Cryptography. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
two-party primitives, quantum protocols, oblivious transfer, quantum information theory |
1 | Ivan Damgård, Carolin Lunemann |
Quantum-Secure Coin-Flipping and Applications. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
common reference string, quantum zero-knowledge, quantum cryptography, coin-flipping |
1 | Mathias Herrmann, Alexander May 0001 |
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
small roots, lattices, power generator, systems of equations |
1 | Hoeteck Wee |
Zero Knowledge in the Random Oracle Model, Revisited. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
sequential composition, zero-knowledge, obfuscation, random oracle model |
1 | Liqun Chen 0002, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi |
Security Notions and Generic Constructions for Client Puzzles. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Benny Pinkas, Thomas Schneider 0003, Nigel P. Smart, Stephen C. Williams |
Secure Two-Party Computation Is Practical. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation |
1 | Florian Mendel, Christian Rechberger, Martin Schläffer |
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, combiner, differential, MD5 |
1 | Vadim Lyubashevsky |
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Katsuyuki Takashima |
Hierarchical Predicate Encryption for Inner-Products. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Julien Cathalo, Benoît Libert, Moti Yung |
Group Encryption: Non-interactive Realization in the Standard Model. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Group encryption, anonymity, provable security |
1 | Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi |
Foundations of Non-malleable Hash and One-Way Functions. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Joux, Stefan Lucks |
Improved Generic Algorithms for 3-Collisions. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
multicollision, random map, memory-efficient, cryptanalysis, parallel implementation |
1 | Olivier Billet, Gilles Macario-Rat |
Cryptanalysis of the Square Cryptosystems. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xiaorui Sun, Xuejia Lai |
The Key-Dependent Attack on Block Ciphers. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Key-Dependent Attack, Block Cipher, IDEA |
1 | Matthieu Finiasz, Nicolas Sendrier |
Security Bounds for the Design of Code-Based Cryptosystems. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
computational syndrome decoding, information set decoding, generalized birthday algorithm |
1 | Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev 0001, Hovav Shacham, Scott Yilek |
Hedged Public-Key Encryption: How to Protect against Bad Randomness. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Arkady Yerukhimovich |
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Dominique Unruh |
Limits of Constructive Security Proofs. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Green 0001, Susan Hohenberger |
Universally Composable Adaptive Oblivious Transfer. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet, Keqin Feng |
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Boolean function, Stream cipher, Algebraic attack |
1 | Hovav Shacham, Brent Waters |
Compact Proofs of Retrievability. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon, Jin Hong 0001, Minkyu Kim |
Speeding Up the Pollard Rho Method on Prime Fields. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Pollard rho, r-adding walk, prime field, discrete logarithm problem |
1 | Jung-Keun Lee, Dong Hoon Lee 0002, Sangwoo Park |
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Sosemanuk, SNOW 2.0, linear mask, stream cipher, correlation attack |
1 | Ueli M. Maurer, Stefano Tessaro |
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kan Yasuda |
How to Fill Up Merkle-Damgård Hash Functions. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding |
1 | Xavier Pujol, Damien Stehlé |
Rigorous and Efficient Short Lattice Vectors Enumeration. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
SVP, lattice cryptanalysis, Lattices, numerical stability |
1 | Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang |
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
strongly multiplicative linear secret sharing scheme, secure multi-party computation, monotone span program |
1 | Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi |
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Generic Group Model, Hardness Conditions, Lower Bounds, Straight-Line Programs |
1 | Jan Camenisch, Rafik Chaabouni, Abhi Shelat |
Efficient Protocols for Set Membership and Range Proofs. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Range proofs, set membership proofs, bi-linear maps, proofs of knowledge |
1 | Mathias Herrmann, Alexander May 0001 |
Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
small roots, factoring with known bits, Lattices |
1 | Orr Dunkelman, Nathan Keller |
A New Attack on the LEX Stream Cipher. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
stream cipher design, AES, LEX |
1 | Martin Hirt, Ueli M. Maurer, Vassilis Zikas |
MPC vs. SFE : Unconditional and Computational Security. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson |
Twisted Edwards Curves Revisited. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Efficient elliptic curve arithmetic, unified addition, side channel attack, SPA |
1 | Yu Sasaki, Kazumaro Aoki |
Preimage Attacks on 3, 4, and 5-Pass HAVAL. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
splice-and-cut, hash function, preimage, one-way, meet-in-the-middle, local collision, HAVAL |
1 | Josef Pieprzyk (eds.) |
Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Paul Morrissey, Nigel P. Smart, Bogdan Warinschi |
A Modular Security Analysis of the TLS Handshake Protocol. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Qiong Huang 0001, Guomin Yang, Duncan S. Wong, Willy Susilo |
Ambiguous Optimistic Fair Exchange. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Kaoru Kurosawa |
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Khaled Ouafi, Raphael Overbeck, Serge Vaudenay |
On the Security of HB# against a Man-in-the-Middle Attack. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
HB, RFID, authentication protocols |
1 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Chosen Ciphertext Security with Optimal Ciphertext Overhead. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gorski, Stefan Lucks, Thomas Peyrin |
Slide Attacks on a Class of Hash Functions. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Grindahl, RadioGatún, sponge function, MAC, hash function, slide attacks |
1 | Orr Dunkelman, Nathan Keller |
An Improved Impossible Differential Attack on MISTY1. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Prabhakaran 0001, Mike Rosulek |
Towards Robust Computation on Encrypted Data. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Christian Schridde, Bernd Freisleben |
On the Validity of the phi-Hiding Assumption in Cryptographic Protocols. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
?-Hiding assumption, Jacobi symbol, Euler’s totient function |
1 | Xiaoming Sun 0001, Andrew Chi-Chih Yao, Christophe Tartary |
Graph Design for Secure Multiparty Computation over Non-Abelian Groups. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Graph Coloring, Multiparty Computation, Percolation Theory, Non-Abelian Groups, Passive Adversary |
1 | Michael Backes 0001, Markus Dürmuth, Dominique Unruh |
OAEP Is Secure under Key-Dependent Messages. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Key-dependent message security, RSA-OAEP, chosen ciphertext attacks |
1 | Mihir Bellare, Todor Ristov |
Hash Functions from Sigma Protocols and Improvements to VSH. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Akinori Kawachi, Keisuke Tanaka, Keita Xagawa |
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
concurrent security, ad hoc anonymous identification schemes, identification schemes, Lattice-based cryptography |
1 | Martin Hell, Thomas Johansson 0001 |
Breaking the F-FCSR-H Stream Cipher in Real Time. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Chi-Chih Yao |
Some Perspectives on Complexity-Based Cryptography. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Michael Hamburg |
Generalized Identity Based and Broadcast Encryption Schemes. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|