Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Claude Carlet, Aline Gouget |
An Upper Bound on the Number of m-Resilient Boolean Functions. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
Cryptography, Boolean function, Stream cipher, Resilient function |
1 | K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan |
Asynchronous Secure Communication Tolerating Mixed Adversaries. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Golle, Sheng Zhong 0002, Dan Boneh, Markus Jakobsson, Ari Juels |
Optimistic Mixing for Exit-Polls. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas T. Courtois, Josef Pieprzyk |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations |
1 | Wieb Bosma, James Hutton, Eric R. Verheul |
Looking beyond XTR. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Lucks |
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim 0001 |
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Dowon Hong, Ku-Young Chang, Heuisu Ryu |
Efficient Oblivious Transfer in the Bounded-Storage Model. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham, Orr Dunkelman, Nathan Keller |
Enhancing Differential-Linear Cryptanalysis. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Wakaha Ogata, Kaoru Kurosawa |
Bounds for Robust Metering Schemes and Their Relationship with A-code. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Tomoyuki Asano |
A Revocation Scheme with Minimal Storage at Receivers. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001 (eds.) |
Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Klimov, Anton Mityagin, Adi Shamir |
Analysis of Neural Cryptography. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Tsutomu Matsumoto |
Gummy and Conductive Silicone Rubber Fingers. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Pierrick Gaudry |
A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ju-Sung Kang, Sang-Uk Shin, Dowon Hong, Okyeon Yi |
Provable Security of KASUMI and 3GPP Encryption Mode f8. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Thomé |
Computation of Discrete Logarithms in F2607. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Moses D. Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam D. Smith |
Mutually Independent Commitments. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Alice Silverberg, Jessica Staddon, Judy L. Walker |
Efficient Traitor Tracing Algorithms Using List Decoding. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Tzafrir Cohen, Joe Kilian, Erez Petrank |
Responsive Round Complexity and Concurrent Zero-Knowledge. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
cryptographic protocols, Zero-knowledge, concurrent zero-knowledge |
1 | Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval |
Key-Privacy in Public-Key Encryption. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery |
1 | Eric R. Verheul |
Self-Blindable Credential Certificates from the Weil Pairing. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas J. Hopper, Manuel Blum 0001 |
Secure Human Identification Protocols. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas T. Courtois |
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
MinRank problem, rank-distance codes, syndrome decoding (SD), identification, NP-complete problems, group signatures, Zero-knowledge, ring signatures, multivariate cryptography, entity authentication |
1 | Phong Q. Nguyen, Igor E. Shparlinski |
On the Insecurity of a Server-Aided RSA Protocol. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Server-aided protocol, Cryptanalysis, Lattices, RSA signature |
1 | Dan Boneh, Shai Halevi, Nick Howgrave-Graham |
The Modular Inversion Hidden Number Problem. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Coppersmith's attack, Approximations, MAC, Lattices, PRNG, Modular inversion, Hidden number problems |
1 | Ronald L. Rivest, Adi Shamir, Yael Tauman |
How to Leak a Secret. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
ring signature scheme, signer-ambiguous signature scheme, designated verifier signature scheme, signature scheme, group signature scheme |
1 | Steven D. Galbraith |
Supersingular Curves in Cryptography. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jae Choon Cha, Ki Hyoung Ko, Sangjin Lee, Jae Woo Han, Jung Hee Cheon |
An Efficient Implementation of Braid Groups. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Makoto Sugita, Kazukuni Kobara, Hideki Imai |
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Block Cipher Camellia, Truncated Differential Cryptanalysis, Impossible Differential Cryptanalysis |
1 | Colin Boyd (eds.) |
Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Johan Håstad, Mats Näslund |
Practical Construction and Analysis of Pseudo-Randomness Primitives. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Pierrick Gaudry, Nicolas Gürel |
An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Pierre-Alain Fouque, Jacques Stern |
Fully Distributed Threshold RSA under Standard Assumptions. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Threshold RSA key generation and signature |
1 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
1 | Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee 0002, Jongin Lim 0001, Okyeon Yi |
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
mode of operation for DES, Block cipher, Triple DES |
1 | Anna Lysyanskaya, Chris Peikert |
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Ben Lynn, Hovav Shacham |
Short Signatures from the Weil Pairing. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Duncan S. Wong, Agnes Hui Chan |
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Yan-Cheng Chang, Chi-Jen Lu |
Oblivious Polynomial Evaluation and Oblivious Neural Learning. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Siguna Müller |
A Probable Prime Test with Very High Confidence for n equiv 1 mod 4. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier |
How to Achieve a McEliece-Based Digital Signature Scheme. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Niederreiter cryptosystem, digital signature, short signatures, syndrome decoding, McEliece cryptosystem, Goppa codes |
1 | Yuriy V. Tarannikov, Peter Korolev, Anton Botev |
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
autocorrelation coefficients, global avalanche characteristics, Boolean functions, stream ciphers, resiliency, nonlinearity, bounds, balancedness, correlation immunity, Walsh Transform |
1 | Masayuki Abe, Miyako Ohkubo |
Provably Secure Fair Blind Signatures with Tight Revocation. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Martijn Stam, Arjen K. Lenstra |
Speeding Up XTR. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
binary Euclidean algorithm, LUC, ECC, addition chains, XTR, Fibonacci sequences |
1 | Jacques Patarin |
Generic Attacks on Feistel Schemes. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Feistel permutations, generic attacks on encryption schemes, Luby-Rackoff theory, pseudo-random permutations |
1 | Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh |
A Compact Rijndael Hardware Architecture with S-Box Optimization. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra |
Unbelievable Security. Matching AES Security Using Public Key Systems. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Brian King |
Improved Methods to Perform Threshold RSA. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
threshold RSA, threshold cryptography, threshold secret sharing, cyclotomic polynomials |
1 | Shiho Moriai, Serge Vaudenay |
On the Pseudorandomness of Top-Level Schemes of Block Ciphers. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Chris Pavlovski |
Attacking and Repairing Batch Verification Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Loidreau |
Strengthening McEliece Cryptosystem. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | David A. Wagner 0001 |
Cryptanalysis of the Yi-Lam Hash. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
1 | Markus Jakobsson, Ari Juels |
Mix and Match: Secure Function Evaluation via Ciphertexts. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Mihir Bellare |
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Matthew K. Franklin, Tomas Sander |
Commital Deniable Proofs and Electronic Campaign Finance. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Philip Hawkes, Gregory G. Rose |
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
SOBER, t-class, SSC-II, cryptanalysis, stream ciphers |
1 | Alex Biryukov, Adi Shamir |
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
time/memory tradeoff attacks, Cryptanalysis, stream ciphers |
1 | Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan |
Password-Authenticated Key Exchange Based on RSA. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Anonymous Fingerprinting with Direct Non-repudiation. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
digital coin, anonymity, fingerprinting, restrictiveness |
1 | David A. Wagner 0001, Ian Goldberg |
Proofs of Security for the Unix Password Hashing Algorithm. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Glenn Durfee, Phong Q. Nguyen |
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Moni Naor, Benny Pinkas |
Distributed Oblivious Transfer. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin |
A Note on Security Proofs in the Generic Model. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001, Xian-Mo Zhang |
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
Round-Efficient Conference Key Agreement Protocols with Provable Security. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii |
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Hada |
Zero-Knowledge and Code Obfuscation. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Pascal Paillier |
Trapdooring Discrete Logarithms on Elliptic Curves over Rings. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Louis Goubin, Nicolas T. Courtois |
Cryptanalysis of the TTM Cryptosystem. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Seigo Arita |
Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Markus Jakobsson, Ari Juels |
Addition of ElGamal Plaintexts. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
directed decryption, fast-track, repetition robustness, addition, elgamal |
1 | Wakaha Ogata, Kaoru Kurosawa |
Provably Secure Metering Scheme. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch |
Efficient Anonymous Fingerprinting with Group Signatures. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto (eds.) |
Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra, Eric R. Verheul |
Key Improvements to XTR. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Leonid Reyzin |
A New Forward-Secure Digital Signature Scheme. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
proven security, digital signatures, forward security, concrete security |
1 | Anand Desai, Sara K. Miner |
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications. |
ASIACRYPT |
2000 |
DBLP BibTeX RDF |
|
1 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Hideki Imai, Atsuhiro Yamagishi |
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
cryptographic technology, asymmmetric ciphers, evaluation, symmetric ciphers |
1 | Danny Gutfreund, Michael Ben-Or |
Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Thomas A. Berson |
Cryptography Everywhere. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Antoine Joux, Phong Q. Nguyen |
Why Textbook ElGamal and RSA Encryption Are Insecure. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Masashi Mitomo, Kaoru Kurosawa |
Attack for Flash MIX. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, François Koeune, David Naccache |
From Fixed-Length to Arbitrary-Length RSA Padding Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Martin Hirt, Ueli M. Maurer, Bartosz Przydatek |
Efficient Secure Multi-party Computation. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Phillip Rogaway |
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart |
Power Analysis, What Is Now Possible.... |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
dpa, spa, smart-cards, power analysis |
1 | Claus-Peter Schnorr, Markus Jakobsson |
Security of Signed ElGamal Encryption. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Alexandra Boldyreva |
The Security of Chaffing and Winnowing. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Seokhie Hong, Sangjoon Park |
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai |
Unconditionally Secure Digital Signature Schemes Admitting Transferability. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Safuat Hamdy, Bodo Möller |
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Miyako Ohkubo, Masayuki Abe |
A Length-Invariant Hybrid Mix. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Ivan Damgård |
Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Pascal Paillier, David Pointcheval |
Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Andries E. Brouwer, Ruud Pellikaan, Eric R. Verheul |
Doing More with Fewer Bits. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|