The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ASIACRYPT"( http://dblp.L3S.de/Venues/ASIACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiacrypt

Publication years (Num. hits)
1990-1991 (47) 1993-1994 (37) 1995-1996 (36) 1998 (34) 1999 (33) 2000 (48) 2001 (35) 2002 (37) 2003 (34) 2004 (38) 2005 (38) 2006 (31) 2007 (36) 2008 (35) 2009 (42) 2010 (36) 2011 (41) 2012 (46) 2020 (1)
Publication types (Num. hits)
inproceedings(665) proceedings(20)
Venues (Conferences, Journals, ...)
ASIACRYPT(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 431 occurrences of 269 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jason Keller, Joe Kilian A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic Voting, Secure Computation
1Florian Mendel, Vincent Rijmen Cryptanalysis of the Tiger Hash Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision
1Jens Groth, Steve Lu 0001 A Non-interactive Shuffle with Pairing Based Verifiability. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Shuffle, mix-net, non-interactive zero-knowledge, bilinear group
1Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations
1Gilles Brassard, Anne Broadbent, Joseph F. Fitzsimons, Sébastien Gambs, Alain Tapp Anonymous Quantum Communication. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dining cryptographers, anonymity, multiparty computation, quantum cryptography
1Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung Two-Party Computing with Encrypted Data. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Computing with Encrypted Data, CryptoComputing, oblivious transfer, Secure Two-Party Computation
1Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ran Canetti Obtaining Universally Compoable Security: Towards the Bare Bones of Trust. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Thomas Peyrin Cryptanalysis of Grindahl. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Grindahl, hash functions, Rijndael
1Anne Broadbent, Alain Tapp Information-Theoretic Security Without an Honest Majority. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymous message transmission, election protocols, dining cryptographers, collision detection, information-theoretic security, Multiparty computation
1Aggelos Kiayias, Yiannis Tsiounis, Moti Yung Group Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose, Je Hong Park, Aaram Yun A Simple Variant of the Merkle-Damgård Scheme with a Permutation. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Relations Among Notions of Non-malleability for Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public-key Encryption, Non-malleability
1Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik A Kilobit Special Number Field Sieve Factorization. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jens Groth Fully Anonymous Group Signatures Without Random Oracles. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certified signatures, Group signatures, bilinear groups
1Matthew K. Franklin, Mark A. Gondree, Payman Mohassel Multi-party Indirect Indexing and Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF oblivious RAM machine, communication complexity, secure multiparty computation, privacy-preserving protocols
1Kaoru Kurosawa (eds.) Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen Secure Protocols with Asymmetric Trust. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Matthew Green 0001, Susan Hohenberger Blind Identity-Based Encryption and Simulatable Oblivious Transfer. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xavier Boyen Miniature CCA2 PK Encryption: Tight Security Without Redundancy. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Martin Hell, Thomas Johansson 0001 A Key Recovery Attack on Edon80. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay On Privacy Models for RFID. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer, Dominik Raub Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations
1Antoine Joux, David Naccache, Emmanuel Thomé When e-th Roots Become Easier Than Factoring. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rsa, factoring, nfs, roots
1Thomas Ristenpart, Thomas Shrimpton How to Build a Hash Function from Any Collision-Resistant Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen, Vincent Rijmen Known-Key Distinguishers for Some Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distinguishing algorithms, Cryptanalysis, Block Cipher, AES, Feistel ciphers
1Elena Andreeva 0001, Gregory Neven, Bart Preneel, Thomas Shrimpton Seven-Property-Preserving Iterated Hashing: ROX. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto Authenticated Key Exchange and Key Encapsulation in the Standard Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jason Yang, James Goodman 0001 Symmetric Key Cryptography on Modern Graphics Hardware. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu On Tweaking Luby-Rackoff Blockciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Zuzana Beerliová-Trubíniová, Martin Hirt Simple and Efficient Perfectly-Secure Asynchronous MPC. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF efficiency, asynchronous, hybrid model, Multi-party computation, perfect security
1Goce Jakimoski, K. P. Subbalakshmi On Efficient Message Authentication Via Block Cipher Design Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions
1Daniel J. Bernstein, Tanja Lange 0001 Faster Addition and Doubling on Elliptic Curves. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-scalar multiplication, side-channel countermeasures, unified addition formulas, complete addition formulas, performance evaluation, Elliptic curves, register allocation, scalar multiplication, efficient implementation, addition, explicit formulas, doubling
1Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser Efficient Byzantine Agreement with Faulty Minority. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF broadcast, efficiency, consensus, Byzantine agreement, information-theoretic security, multi-party computation
1Kan Yasuda Boosting Merkle-Damgård Hashing for Message Authentication. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, hash function, message authentication code, mode of operation, HMAC, related-key attack, pseudo-random function, compression function, NMAC
1Cécile Delerablée Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, David Pointcheval A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smooth Projective Hash Functions, Group Key Exchange, Password-based Authentication
1Satoshi Obana, Toshinori Araki Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Tsuyoshi Takagi New Approach for Selectively Convertible Undeniable Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF selective conversion, RSA, undeniable signature
1Ellen Jochemsz, Alexander May 0001 A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF small roots, Coppersmith’s method, RSA variants, cryptanalysis, lattices
1Alexandra Boldyreva, Marc Fischlin On the Security of OAEP. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Souradyuti Paul, Bart Preneel On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Bin Zhang 0003, Dengguo Feng New Guess-and-Determine Attack on the Self-Shrinking Generator. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Self-shrinking, Guess-and-determine, Stream cipher, Linear feedback shift register (LFSR)
1Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Christophe De Cannière, Christian Rechberger Finding SHA-1 Characteristics: General Results and Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Roberto Maria Avanzi, Vassil S. Dimitrov, Christophe Doche, Francesco Sica 0001 Extending Scalar Multiplication Using Double Bases. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ventzislav Nikov, Svetla Nikova, Bart Preneel A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Homomorphic Semantically Secure Cryptosystems, Paillier’s Public-Key Cryptosystem, Non-Interactive Zero-Knowledge Arguments, Oblivious Transfer
1Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw Combining Compression Functions and Block Cipher-Based Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF block ciphers, hash functions, compression functions
1Qiming Li, Yagiz Sutcu, Nasir D. Memon Secure Sketch for Biometric Templates. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF biometric template, continuous domain, Secure sketch
1Jens Groth Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Eli Biham, Orr Dunkelman, Nathan Keller New Cryptanalytic Results on IDEA. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations
1Isamu Teranishi, Wakaha Ogata Relationship Between Standard Model Plaintext Awareness and Message Hiding. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Standard Model, Plaintext Awareness
1Scott Contini, Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Thomas Ristenpart Multi-Property-Preserving Hash Domain Extension and the EMD Transform. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård, Hash functions, random oracle, pseudorandom function, collision-resistance
1Gregor Leander, Andy Rupp On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computational Equivalence, RSA Problem, Factorization Problem, Generic Algorithms
1Xuejia Lai, Kefei Chen (eds.) Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Pierrick Gaudry, T. Houtmann, David R. Kohel, Christophe Ritzenthaler, A. Weng The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Palash Sarkar 0001 HIBE With Short Public Parameters Without Random Oracle. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Thomas Baignères, Matthieu Finiasz KFC - The Krazy Feistel Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Pascal Paillier, Jorge Luis Villar Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Na Li, Wen-Feng Qi 0001 Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Boolean functions, resilience, nonlinearity, Algebraic attack, balancedness, algebraic immunity
1Zhengjun Cao Analysis of One Popular Group Signature Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF exculpability, anonymity, group signature
1Nuttapong Attrapadung, Jun Furukawa 0001, Hideki Imai Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1David Galindo, Javier Herranz, Eike Kiltz On the Generic Construction of Identity-Based Signatures with Additional Properties. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta Improved Collision Search for SHA-0. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marc Girault, David Lefranc Server-Aided Verification: Theory and Practice. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identification protocol, digital signature, zero-knowledge, discrete logarithm, pairing, non-repudiation, bilinear map, interactive proof
1Caroline Kudla, Kenneth G. Paterson Modular Security Proofs for Key Agreement Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Nobuo Funabiki Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock Errors in Computational Complexity Proofs for Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval A Simple Threshold Authenticated Key Exchange from Short Secrets. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Threshold Protocols, Password-based Authentication
1Bimal K. Roy (eds.) Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David Jao, Stephen D. Miller, Ramarathnam Venkatesan Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random reducibility, modular forms, L-functions, generalized Riemann hypothesis, elliptic curves, expanders, Ramanujan graphs, isogenies, rapid mixing, discrete log
1Vladimir Kolesnikov Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Craig Gentry, David Molnar, Zulfikar Ramzan Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Frédéric Muller, Thomas Peyrin Linear Cryptanalysis of the TSC Family of Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stefan Lucks A Failure-Friendly Design Principle for Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-collision, failure- friendliness, hash function, provable security
1Douglas Wikström A Sender Verifiable Mix-Net and a New Proof of a Shuffle. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Pascal Paillier, Damien Vergnaud Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Moses D. Liskov Updatable Zero-Knowledge Databases. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Andreas Jakoby, Maciej Liskiewicz Revealing Additional Information in Two-Party Computations. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Hideki Imai Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Matthias Christandl, Stephanie Wehner Quantum Anonymous Transmissions. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen, Frédéric Muller Some Attacks Against a Double Length Hash Proposal. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vassil S. Dimitrov, Laurent Imbert, Pradeep Kumar Mishra Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Eli Biham, Orr Dunkelman, Nathan Keller A Related-Key Rectangle Attack on the Full KASUMI. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ryotaro Hayashi 0001, Keisuke Tanaka Universally Anonymizable Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy
1Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jin Hong 0001, Palash Sarkar 0001 New Applications of Time Memory Data Tradeoffs. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time memory data tradeoff
1Fabien Laguillaumie, Pascal Paillier, Damien Vergnaud Universally Convertible Directed Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Renato Renner, Stefan Wolf 0001 Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Information-theoretic cryptography, quantum key agreement, data compression, privacy amplification, randomness extraction, information reconciliation, entropy measures
1James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta 0001, Aleksandr Yampolskiy Spreading Alerts Quietly and the Subgroup Escape Problem. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Blind Coupon Mechanism, AND-homomorphic Bit Commitment, Subgroup Escape Problem, Elliptic Curves Over Composite Moduli, Anonymous Communication
1Alexander Maximov, Thomas Johansson 0001 Fast Computation of Large Distributions and Its Cryptographic Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joydip Mitra A Near-Practical Attack Against B Mode of HBB. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF known-plaintext attack, HBB, cryptanalysis, stream cipher
1Phong Q. Nguyen, Jacques Stern Adapting Density Attacks to Low-Weight Knapsacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Lattices, Knapsack, Public-Key Cryptanalysis, Subset Sum
1Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license