The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ASIACRYPT"( http://dblp.L3S.de/Venues/ASIACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiacrypt

Publication years (Num. hits)
1990-1991 (47) 1993-1994 (37) 1995-1996 (36) 1998 (34) 1999 (33) 2000 (48) 2001 (35) 2002 (37) 2003 (34) 2004 (38) 2005 (38) 2006 (31) 2007 (36) 2008 (35) 2009 (42) 2010 (36) 2011 (41) 2012 (46)
Publication types (Num. hits)
inproceedings(665) proceedings(19)
Venues (Conferences, Journals, ...)
ASIACRYPT(684)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 431 occurrences of 269 keywords

Results
Found 684 publication records. Showing 684 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jooyoung Lee Provable Security of the Knudsen-Preneel Compression Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dmitry Khovratovich Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Benoît Libert, Thomas Peters Computing on Authenticated Data: New Privacy Definitions and Constructions. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abhishek Jain 0002, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thomas Peyrin, Yu Sasaki, Lei Wang 0031 Generic Related-Key Attacks for HMAC. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Patrick Longa, Francesco Sica Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Takaaki Mizuki, Michihito Kumamoto, Hideaki Sone The Five-Card Trick Can Be Done with Four Cards. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Gerbush, Allison B. Lewko, Adam O'Neill, Brent Waters Dual Form Signatures: An Approach for Proving Security from Static Assumptions. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Meicheng Liu, Yin Zhang, Dongdai Lin Perfect Algebraic Immune Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Léo Ducas, Phong Q. Nguyen Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jorge Luis Villar Optimal Reductions of Some Decisional Problems to the Rank Problem. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gaëtan Leurent Analysis of Differential Attacks in ARX Constructions. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031, Shuang Wu, Wenling Wu Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel Signature Schemes Secure against Hard-to-Invert Leakage. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede Theory and Practice of a Leakage Resilient Masking Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang Integral and Multidimensional Linear Distinguishers with Correlation Zero. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Viet Tung Hoang, Phillip Rogaway Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn A Coding-Theoretic Approach to Recovering Noisy RSA Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto, Katsuyuki Takashima Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiaoyun Wang, Kazue Sako (eds.) Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Bernhard, Olivier Pereira, Bogdan Warinschi How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Saqib A. Kakvi, Eike Kiltz, Alexander May 0001 Certifying RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici Differential Analysis of the LED Block Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento IND-CCA Secure Cryptography Based on a Variant of the LPN Problem. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chuanming Zong Some Mathematical Mysteries in Lattices. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Takuya Hayashi 0001, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397). Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, François-Xavier Standaert Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dimitar Jetchev, Onur Özen, Martijn Stam Understanding Adaptivity: Random Systems Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Léo Ducas, Phong Q. Nguyen Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jae Hong Seo On the (Im)possibility of Projecting Property in Prime-Order Setting. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rafael Pass, Huijia Lin, Muthuramakrishnan Venkitasubramaniam A Unified Framework for UC from Only OT. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Eran Omri, Hila Zarosim Completeness for Symmetric Two-Party Functionalities - Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dan Boneh Pairing-Based Cryptography: Past, Present, and Future. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Claudio Orlandi Calling Out Cheaters: Covert Security with Public Verifiability. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling Differential Attacks against Stream Cipher ZUC. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kyle Brogle, Sharon Goldberg, Leonid Reyzin Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joppe W. Bos, Thorsten Kleinjung ECM at Work. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shahram Khazaei, Tal Moran, Douglas Wikström A Mix-Net from Any CCA2 Secure Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rodolphe Lampe, Jacques Patarin, Yannick Seurin An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christophe Petit, Jean-Jacques Quisquater On Polynomial Systems Arising from a Weil Descent. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Kenneth G. Paterson, Susan Thomson 0001 RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bart Mennink Optimal Collision Security in Double Block Length Hashing with Single Length Key. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Scott Ames, Rosario Gennaro, Muthuramakrishnan Venkitasubramaniam The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Liting Zhang, Wenling Wu, Han Sui, Peng Wang 0009 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat Practical Key-Recovery for All Possible Parameters of SFLASH. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Jens Groth, Miyako Ohkubo Separating Short Structure-Preserving Signatures from Non-interactive Assumptions. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Tomislav Nad, Martin Schläffer Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jens Groth Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alexander May 0001, Alexander Meurer, Enrico Thomae Decoding Random Linear Codes in $\tilde{\mathcal{O}}(2^{0.054n})$. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Tibor Jager, Eike Kiltz Short Signatures from Weaker Assumptions. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry Random Oracles in a Quantum World. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Claude Crépeau, Louis Salvail, Jean-Raymond Simard, Alain Tapp Two Provers in Isolation. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum Program Obfuscation with Leaky Hardware. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Mingfei Li Oblivious RAM with O((logN)3) Worst-Case Cost. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dong Hoon Lee 0001, Xiaoyun Wang (eds.) Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner Cryptanalysis of ARMADILLO2. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolic Second-Order Differential Collisions for Reduced SHA-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chao Ning, Qiuliang Xu Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret Polly Cracker, Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pierrick Gaudry, David R. Kohel, Benjamin A. Smith Counting Points on Genus 2 Curves with Real Multiplication. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger Biclique Cryptanalysis of the Full AES. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Oriol Farràs, Carles Padró, Chaoping Xing, An Yang Natural Generalizations of Threshold Secret Sharing. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Ewan Fleischmann, Matthias Krause 0001, Jooyoung Lee 0001, Martijn Stam, John P. Steinberger The Preimage Security of Double-Block-Length Compression Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Raghav Bhaskar, Abhishek Bhowmick 0001, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta Noiseless Database Privacy. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann 0001 An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger On the Efficiency of Bit Commitment Reductions. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi Lower and Upper Bounds for Deniable Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefan Dziembowski, Sebastian Faust Leakage-Resilient Cryptography from the Inner-Product Extractor. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qianhong Wu, Bo Qin, Lei Zhang 0009, Josep Domingo-Ferrer, Oriol Farràs Bridging Broadcast Encryption and Group Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson 0001 On the Joint Security of Encryption and Signature, Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, David Cash, Rachel Miller Cryptography Secure against Related-Key Attacks and Tampering. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuanmi Chen, Phong Q. Nguyen BKZ 2.0: Better Lattice Security Estimates. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan Functional Encryption for Inner Product Predicates from Learning with Errors. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Seung Geol Choi, Aggelos Kiayias, Tal Malkin BiTR: Built-in Tamper Resilience. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Stephan Krenn, Victor Shoup A Framework for Practical Universally Composable Zero-Knowledge Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Divesh Aggarwal, Ueli Maurer The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qiushi Yang, Yvo Desmedt Secure Communication in Multicast Graphs. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Aniket Kate, Arpita Patra Computational Verifiable Secret Sharing Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Benoît Libert, Mark Manulis Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Lior Malka Constant-Round Private Function Evaluation with Linear Complexity. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1María Naya-Plasencia, Deniz Toz, Kerem Varici Rebound Attack on JH42. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens Structure Preserving CCA Secure Encryption and Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Eike Kiltz, Krzysztof Pietrzak Leakage Resilient ElGamal Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang Efficient String-Commitment from Weak Bit-Commitment. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan The Round Complexity of Verifiable Secret Sharing: The Statistical Case. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi, Amit Sahai On Invertible Sampling and Adaptive Security. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Onur Özen, Martijn Stam Collision Attacks against the Knudsen-Preneel Compression Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jens Groth Short Pairing-Based Non-interactive Zero-Knowledge Arguments. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eric Brier, Thomas Peyrin A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs Efficient Public-Key Cryptography in the Presence of Key Leakage. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Emmanuel Volte, Valérie Nachef, Jacques Patarin Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chao Ning, Qiuliang Xu Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vivien Dubois, Nicolas Gama The Degree of Regularity of HFE Systems. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thomas Fuhr 0001 Finding Second Preimages of Short Messages for Hamsi-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 684 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license