ASIACRYPT A

38 papers

YearTitle / Authors
2004A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.
Tatsuyuki Matsushita, Hideki Imai
2004Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings
Pil Joong Lee
2004Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract).
Bartosz Przydatek, Reto Strobl
2004Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices.
Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis
2004Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes.
Feng Bao
2004Comparison Between XL and Gröbner Basis Algorithms.
Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita
2004Constant-Round Authenticated Group Key Exchange for Dynamic Groups.
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
2004Cryptanalysis of Bluetooth Keystream Generator Two-Level E0.
Yi Lu, Serge Vaudenay
2004Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.
Aggelos Kiayias, Moti Yung
2004Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC.
Phillip Rogaway
2004Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings.
Lan Nguyen, Reihaneh Safavi-Naini
2004Eliminating Random Permutation Oracles in the Even-Mansour Cipher.
Craig Gentry, Zulfikar Ramzan
2004Generic Homomorphic Undeniable Signatures.
Jean Monnerat, Serge Vaudenay
2004Higher Order Universal One-Way Hash Functions.
Deukjo Hong, Bart Preneel, Sangjin Lee
2004How Far Can We Go Beyond Linear Cryptanalysis?
Thomas Baignères, Pascal Junod, Serge Vaudenay
2004Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.
Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti
2004Information Security in Korea IT839 Strategy.
Ho-Ick Suk
2004Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
2004Masking Based Domain Extenders for UOWHFs: Bounds and Constructions.
Palash Sarkar
2004New Approaches to Password Authenticated Key Exchange Based on RSA.
Muxiang Zhang
2004OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding.
Duong Hieu Phan, David Pointcheval
2004On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds.
Taizo Shirai, Bart Preneel
2004On Provably Secure Time-Stamping Schemes.
Ahto Buldas, Märt Saarepera
2004On the Generalized Linear Equivalence of Functions Over Finite Fields.
Luca Breveglieri, Alessandra Cherubini, Marco Macchetti
2004On the Security of MOR Public Key Cryptosystem.
In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek
2004Practical Two-Party Computation Based on the Conditional Gate.
Berry Schoenmakers, Pim Tuyls
2004Privacy in Non-private Environments.
Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey
2004Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups.
Eonkyung Lee
2004Secret Handshakes from CA-Oblivious Encryption.
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
2004Sieving Using Bucket Sort.
Kazumaro Aoki, Hiroki Ueda
2004Stream Ciphers: Dead or Alive?
Adi Shamir
2004Strong Conditional Oblivious Transfer and Computing on Intervals.
Ian F. Blake, Vladimir Kolesnikov
2004The Davies-Murphy Power Attack.
Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette
2004The MD2 Hash Function Is Not One-Way.
Frédéric Muller
2004The XL-Algorithm and a Conjecture from Commutative Algebra.
Claus Diem
2004Time-Memory Trade-Off Attacks on Multiplications and T-Functions.
Joydip Mitra, Palash Sarkar
2004Towards Plaintext-Aware Public-Key Encryption Without Random Oracles.
Mihir Bellare, Adriana Palacio
2004k-Times Anonymous Authentication (Extended Abstract).
Isamu Teranishi, Jun Furukawa, Kazue Sako