Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jason Keller, Joe Kilian |
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Electronic Voting, Secure Computation |
1 | Florian Mendel, Vincent Rijmen |
Cryptanalysis of the Tiger Hash Function. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision |
1 | Jens Groth, Steve Lu 0001 |
A Non-interactive Shuffle with Pairing Based Verifiability. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Shuffle, mix-net, non-interactive zero-knowledge, bilinear group |
1 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations |
1 | Gilles Brassard, Anne Broadbent, Joseph F. Fitzsimons, Sébastien Gambs, Alain Tapp |
Anonymous Quantum Communication. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
dining cryptographers, anonymity, multiparty computation, quantum cryptography |
1 | Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung |
Two-Party Computing with Encrypted Data. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Computing with Encrypted Data, CryptoComputing, oblivious transfer, Secure Two-Party Computation |
1 | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Bounded CCA2-Secure Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai |
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti |
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Peyrin |
Cryptanalysis of Grindahl. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Grindahl, hash functions, Rijndael |
1 | Anne Broadbent, Alain Tapp |
Information-Theoretic Security Without an Honest Majority. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
anonymous message transmission, election protocols, dining cryptographers, collision detection, information-theoretic security, Multiparty computation |
1 | Aggelos Kiayias, Yiannis Tsiounis, Moti Yung |
Group Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Hirose, Je Hong Park, Aaram Yun |
A Simple Variant of the Merkle-Damgård Scheme with a Permutation. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Relations Among Notions of Non-malleability for Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption, Non-malleability |
1 | Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik |
A Kilobit Special Number Field Sieve Factorization. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth |
Fully Anonymous Group Signatures Without Random Oracles. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
certified signatures, Group signatures, bilinear groups |
1 | Matthew K. Franklin, Mark A. Gondree, Payman Mohassel |
Multi-party Indirect Indexing and Applications. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
oblivious RAM machine, communication complexity, secure multiparty computation, privacy-preserving protocols |
1 | Kaoru Kurosawa (eds.) |
Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen |
Secure Protocols with Asymmetric Trust. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Green 0001, Susan Hohenberger |
Blind Identity-Based Encryption and Simulatable Oblivious Transfer. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen |
Miniature CCA2 PK Encryption: Tight Security Without Redundancy. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Martin Hell, Thomas Johansson 0001 |
A Key Recovery Attack on Edon80. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
On Privacy Models for RFID. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, Dominik Raub |
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations |
1 | Antoine Joux, David Naccache, Emmanuel Thomé |
When e-th Roots Become Easier Than Factoring. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
rsa, factoring, nfs, roots |
1 | Thomas Ristenpart, Thomas Shrimpton |
How to Build a Hash Function from Any Collision-Resistant Function. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Lars R. Knudsen, Vincent Rijmen |
Known-Key Distinguishers for Some Block Ciphers. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Distinguishing algorithms, Cryptanalysis, Block Cipher, AES, Feistel ciphers |
1 | Elena Andreeva 0001, Gregory Neven, Bart Preneel, Thomas Shrimpton |
Seven-Property-Preserving Iterated Hashing: ROX. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto |
Authenticated Key Exchange and Key Encapsulation in the Standard Model. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jason Yang, James Goodman 0001 |
Symmetric Key Cryptography on Modern Graphics Hardware. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu |
On Tweaking Luby-Rackoff Blockciphers. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Zuzana Beerliová-Trubíniová, Martin Hirt |
Simple and Efficient Perfectly-Secure Asynchronous MPC. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
efficiency, asynchronous, hybrid model, Multi-party computation, perfect security |
1 | Goce Jakimoski, K. P. Subbalakshmi |
On Efficient Message Authentication Via Block Cipher Design Techniques. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions |
1 | Daniel J. Bernstein, Tanja Lange 0001 |
Faster Addition and Doubling on Elliptic Curves. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
multi-scalar multiplication, side-channel countermeasures, unified addition formulas, complete addition formulas, performance evaluation, Elliptic curves, register allocation, scalar multiplication, efficient implementation, addition, explicit formulas, doubling |
1 | Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser |
Efficient Byzantine Agreement with Faulty Minority. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
broadcast, efficiency, consensus, Byzantine agreement, information-theoretic security, multi-party computation |
1 | Kan Yasuda |
Boosting Merkle-Damgård Hashing for Message Authentication. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, hash function, message authentication code, mode of operation, HMAC, related-key attack, pseudo-random function, compression function, NMAC |
1 | Cécile Delerablée |
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, David Pointcheval |
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Smooth Projective Hash Functions, Group Key Exchange, Password-based Authentication |
1 | Satoshi Obana, Toshinori Araki |
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Tsuyoshi Takagi |
New Approach for Selectively Convertible Undeniable Signature Schemes. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
selective conversion, RSA, undeniable signature |
1 | Ellen Jochemsz, Alexander May 0001 |
A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
small roots, Coppersmith’s method, RSA variants, cryptanalysis, lattices |
1 | Alexandra Boldyreva, Marc Fischlin |
On the Security of OAEP. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Souradyuti Paul, Bart Preneel |
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Bin Zhang 0003, Dengguo Feng |
New Guess-and-Determine Attack on the Self-Shrinking Generator. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Self-shrinking, Guess-and-determine, Stream cipher, Linear feedback shift register (LFSR) |
1 | Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung |
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Christophe De Cannière, Christian Rechberger |
Finding SHA-1 Characteristics: General Results and Applications. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Maria Avanzi, Vassil S. Dimitrov, Christophe Doche, Francesco Sica 0001 |
Extending Scalar Multiplication Using Double Bases. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ventzislav Nikov, Svetla Nikova, Bart Preneel |
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Homomorphic Semantically Secure Cryptosystems, Paillier’s Public-Key Cryptosystem, Non-Interactive Zero-Knowledge Arguments, Oblivious Transfer |
1 | Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw |
Combining Compression Functions and Block Cipher-Based Hash Functions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
block ciphers, hash functions, compression functions |
1 | Qiming Li, Yagiz Sutcu, Nasir D. Memon |
Secure Sketch for Biometric Templates. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
biometric template, continuous domain, Secure sketch |
1 | Jens Groth |
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham, Orr Dunkelman, Nathan Keller |
New Cryptanalytic Results on IDEA. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations |
1 | Isamu Teranishi, Wakaha Ogata |
Relationship Between Standard Model Plaintext Awareness and Message Hiding. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Standard Model, Plaintext Awareness |
1 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Thomas Ristenpart |
Multi-Property-Preserving Hash Domain Extension and the EMD Transform. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, Hash functions, random oracle, pseudorandom function, collision-resistance |
1 | Gregor Leander, Andy Rupp |
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Computational Equivalence, RSA Problem, Factorization Problem, Generic Algorithms |
1 | Xuejia Lai, Kefei Chen (eds.) |
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Pierrick Gaudry, T. Houtmann, David R. Kohel, Christophe Ritzenthaler, A. Weng |
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, Palash Sarkar 0001 |
HIBE With Short Public Parameters Without Random Oracle. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Baignères, Matthieu Finiasz |
KFC - The Krazy Feistel Cipher. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Pascal Paillier, Jorge Luis Villar |
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Na Li, Wen-Feng Qi 0001 |
Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Boolean functions, resilience, nonlinearity, Algebraic attack, balancedness, algebraic immunity |
1 | Zhengjun Cao |
Analysis of One Popular Group Signature Scheme. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
exculpability, anonymity, group signature |
1 | Nuttapong Attrapadung, Jun Furukawa 0001, Hideki Imai |
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David Galindo, Javier Herranz, Eike Kiltz |
On the Generic Construction of Identity-Based Signatures with Additional Properties. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta |
Improved Collision Search for SHA-0. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marc Girault, David Lefranc |
Server-Aided Verification: Theory and Practice. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
identification protocol, digital signature, zero-knowledge, discrete logarithm, pairing, non-repudiation, bilinear map, interactive proof |
1 | Caroline Kudla, Kenneth G. Paterson |
Modular Security Proofs for Key Agreement Protocols. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Nobuo Funabiki |
Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
Errors in Computational Complexity Proofs for Protocols. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval |
A Simple Threshold Authenticated Key Exchange from Short Secrets. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Threshold Protocols, Password-based Authentication |
1 | Bimal K. Roy (eds.) |
Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David Jao, Stephen D. Miller, Ramarathnam Venkatesan |
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
random reducibility, modular forms, L-functions, generalized Riemann hypothesis, elliptic curves, expanders, Ramanujan graphs, isogenies, rapid mixing, discrete log |
1 | Vladimir Kolesnikov |
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, David Molnar, Zulfikar Ramzan |
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Muller, Thomas Peyrin |
Linear Cryptanalysis of the TSC Family of Stream Ciphers. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Lucks |
A Failure-Friendly Design Principle for Hash Functions. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
multi-collision, failure- friendliness, hash function, provable security |
1 | Douglas Wikström |
A Sender Verifiable Mix-Net and a New Proof of a Shuffle. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Pascal Paillier, Damien Vergnaud |
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Moses D. Liskov |
Updatable Zero-Knowledge Databases. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater |
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Jakoby, Maciej Liskiewicz |
Revealing Additional Information in Two-Party Computations. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Nuttapong Attrapadung, Hideki Imai |
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Christandl, Stephanie Wehner |
Quantum Anonymous Transmissions. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Lars R. Knudsen, Frédéric Muller |
Some Attacks Against a Double Length Hash Proposal. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vassil S. Dimitrov, Laurent Imbert, Pradeep Kumar Mishra |
Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham, Orr Dunkelman, Nathan Keller |
A Related-Key Rectangle Attack on the Full KASUMI. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Universally Anonymizable Public-Key Encryption. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy |
1 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jin Hong 0001, Palash Sarkar 0001 |
New Applications of Time Memory Data Tradeoffs. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
time memory data tradeoff |
1 | Fabien Laguillaumie, Pascal Paillier, Damien Vergnaud |
Universally Convertible Directed Signatures. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Renato Renner, Stefan Wolf 0001 |
Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Information-theoretic cryptography, quantum key agreement, data compression, privacy amplification, randomness extraction, information reconciliation, entropy measures |
1 | James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta 0001, Aleksandr Yampolskiy |
Spreading Alerts Quietly and the Subgroup Escape Problem. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Blind Coupon Mechanism, AND-homomorphic Bit Commitment, Subgroup Escape Problem, Elliptic Curves Over Composite Moduli, Anonymous Communication |
1 | Alexander Maximov, Thomas Johansson 0001 |
Fast Computation of Large Distributions and Its Cryptographic Applications. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joydip Mitra |
A Near-Practical Attack Against B Mode of HBB. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
known-plaintext attack, HBB, cryptanalysis, stream cipher |
1 | Phong Q. Nguyen, Jacques Stern |
Adapting Density Attacks to Low-Weight Knapsacks. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Lattices, Knapsack, Public-Key Cryptanalysis, Subset Sum |
1 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|