ASIACRYPT A

35 papers

YearTitle / Authors
2001A Compact Rijndael Hardware Architecture with S-Box Optimization.
Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh
2001A Probable Prime Test with Very High Confidence for n equiv 1 mod 4.
Siguna Müller
2001Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes.
Anna Lysyanskaya, Chris Peikert
2001Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings
Colin Boyd
2001An Efficient Implementation of Braid Groups.
Jae Choon Cha, Ki Hyoung Ko, Sangjin Lee, Jae Woo Han, Jung Hee Cheon
2001An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves.
Pierrick Gaudry, Nicolas Gürel
2001Autocorrelation Coefficients and Correlation Immunity of Boolean Functions.
Yuriy V. Tarannikov, Peter Korolev, Anton Botev
2001Computation of Discrete Logarithms in F
Emmanuel Thomé
2001Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.
Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo
2001Efficient Traitor Tracing Algorithms Using List Decoding.
Alice Silverberg, Jessica Staddon, Judy L. Walker
2001Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank.
Nicolas T. Courtois
2001Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices.
Duncan S. Wong, Agnes Hui Chan
2001Fully Distributed Threshold RSA under Standard Assumptions.
Pierre-Alain Fouque, Jacques Stern
2001Generic Attacks on Feistel Schemes.
Jacques Patarin
2001How to Achieve a McEliece-Based Digital Signature Scheme.
Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier
2001How to Leak a Secret.
Ronald L. Rivest, Adi Shamir, Yael Tauman
2001Key-Privacy in Public-Key Encryption.
Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval
2001Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
2001Mutually Independent Commitments.
Moses D. Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam D. Smith
2001Oblivious Polynomial Evaluation and Oblivious Neural Learning.
Yan-Cheng Chang, Chi-Jen Lu
2001On the Insecurity of a Server-Aided RSA Protocol.
Phong Q. Nguyen, Igor E. Shparlinski
2001Practical Construction and Analysis of Pseudo-Randomness Primitives.
Johan Håstad, Mats Näslund
2001Provable Security of KASUMI and 3GPP Encryption Mode f8.
Ju-Sung Kang, Sang-Uk Shin, Dowon Hong, Okyeon Yi
2001Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case.
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2001Provably Secure Fair Blind Signatures with Tight Revocation.
Masayuki Abe, Miyako Ohkubo
2001Responsive Round Complexity and Concurrent Zero-Knowledge.
Tzafrir Cohen, Joe Kilian, Erez Petrank
2001Secure Human Identification Protocols.
Nicholas J. Hopper, Manuel Blum
2001Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
Makoto Sugita, Kazukuni Kobara, Hideki Imai
2001Self-Blindable Credential Certificates from the Weil Pairing.
Eric R. Verheul
2001Short Signatures from the Weil Pairing.
Dan Boneh, Ben Lynn, Hovav Shacham
2001Speeding Up XTR.
Martijn Stam, Arjen K. Lenstra
2001Supersingular Curves in Cryptography.
Steven D. Galbraith
2001The Modular Inversion Hidden Number Problem.
Dan Boneh, Shai Halevi, Nick Howgrave-Graham
2001Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks.
Pierre-Alain Fouque, David Pointcheval
2001Unbelievable Security. Matching AES Security Using Public Key Systems.
Arjen K. Lenstra