ASIACRYPT A

38 papers

YearTitle / Authors
2005A Failure-Friendly Design Principle for Hash Functions.
Stefan Lucks
2005A Near-Practical Attack Against B Mode of HBB.
Joydip Mitra
2005A Practical Attack on the Fixed RC4 in the WEP Mode.
Itsik Mantin
2005A Related-Key Rectangle Attack on the Full KASUMI.
Eli Biham, Orr Dunkelman, Nathan Keller
2005A Sender Verifiable Mix-Net and a New Proof of a Shuffle.
Douglas Wikström
2005A Simple Threshold Authenticated Key Exchange from Short Secrets.
Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval
2005Adapting Density Attacks to Low-Weight Knapsacks.
Phong Q. Nguyen, Jacques Stern
2005Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings
Bimal K. Roy
2005An Analysis of the XSL Algorithm.
Carlos Cid, Gaëtan Leurent
2005Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.
Pascal Paillier, Damien Vergnaud
2005Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
David Jao, Stephen D. Miller, Ramarathnam Venkatesan
2005Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
Craig Gentry, David Molnar, Zulfikar Ramzan
2005Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps.
Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater
2005Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains.
Vassil S. Dimitrov, Laurent Imbert, Pradeep Kumar Mishra
2005Errors in Computational Complexity Proofs for Protocols.
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005Fast Computation of Large Distributions and Its Cryptographic Applications.
Alexander Maximov, Thomas Johansson
2005Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation.
Vladimir Kolesnikov
2005Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations.
Nuttapong Attrapadung, Hideki Imai
2005Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2005Linear Cryptanalysis of the TSC Family of Stream Ciphers.
Frédéric Muller, Thomas Peyrin
2005Modular Security Proofs for Key Agreement Protocols.
Caroline Kudla, Kenneth G. Paterson
2005New Applications of Time Memory Data Tradeoffs.
Jin Hong, Palash Sarkar
2005New Improvements of Davies-Murphy Cryptanalysis.
Sébastien Kunz-Jacques, Frédéric Muller
2005Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes.
Zhifang Zhang, Mulan Liu, Liangliang Xiao
2005Privacy-Preserving Graph Algorithms in the Semi-honest Model.
Justin Brickell, Vitaly Shmatikov
2005Quantum Anonymous Transmissions.
Matthias Christandl, Stephanie Wehner
2005Revealing Additional Information in Two-Party Computations.
Andreas Jakoby, Maciej Liskiewicz
2005Server-Aided Verification: Theory and Practice.
Marc Girault, David Lefranc
2005Simple and Tight Bounds for Information Reconciliation and Privacy Amplification.
Renato Renner, Stefan Wolf
2005Some Attacks Against a Double Length Hash Proposal.
Lars R. Knudsen, Frédéric Muller
2005Spreading Alerts Quietly and the Subgroup Escape Problem.
James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy
2005Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature).
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
2005Universally Anonymizable Public-Key Encryption.
Ryotaro Hayashi, Keisuke Tanaka
2005Universally Convertible Directed Signatures.
Fabien Laguillaumie, Pascal Paillier, Damien Vergnaud
2005Updatable Zero-Knowledge Databases.
Moses D. Liskov
2005Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation.
Martin Hirt, Jesper Buus Nielsen
2005Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps.
Toru Nakanishi, Nobuo Funabiki