ASIACRYPT A

36 papers

YearTitle / Authors
2007A Key Recovery Attack on Edon80.
Martin Hell, Thomas Johansson
2007A Kilobit Special Number Field Sieve Factorization.
Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
2007A Non-interactive Shuffle with Pairing Based Verifiability.
Jens Groth, Steve Lu
2007A Simple Variant of the Merkle-Damgård Scheme with a Permutation.
Shoichi Hirose, Je Hong Park, Aaram Yun
2007Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings
Kaoru Kurosawa
2007Anonymous Quantum Communication.
Gilles Brassard, Anne Broadbent, Joseph F. Fitzsimons, Sébastien Gambs, Alain Tapp
2007Authenticated Key Exchange and Key Encapsulation in the Standard Model.
Tatsuaki Okamoto
2007Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.
Ueli M. Maurer, Dominik Raub
2007Blind Identity-Based Encryption and Simulatable Oblivious Transfer.
Matthew Green, Susan Hohenberger
2007Boosting Merkle-Damgård Hashing for Message Authentication.
Kan Yasuda
2007Bounded CCA2-Secure Encryption.
Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
2007Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions.
Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
2007Cryptanalysis of Grindahl.
Thomas Peyrin
2007Cryptanalysis of the Tiger Hash Function.
Florian Mendel, Vincent Rijmen
2007Efficient Byzantine Agreement with Faulty Minority.
Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser
2007Faster Addition and Doubling on Elliptic Curves.
Daniel J. Bernstein, Tanja Lange
2007Fully Anonymous Group Signatures Without Random Oracles.
Jens Groth
2007Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.
Jacques Patarin, Valérie Nachef, Côme Berbain
2007Group Encryption.
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
2007How to Build a Hash Function from Any Collision-Resistant Function.
Thomas Ristenpart, Thomas Shrimpton
2007Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys.
Cécile Delerablée
2007Information-Theoretic Security Without an Honest Majority.
Anne Broadbent, Alain Tapp
2007Known-Key Distinguishers for Some Block Ciphers.
Lars R. Knudsen, Vincent Rijmen
2007Miniature CCA2 PK Encryption: Tight Security Without Redundancy.
Xavier Boyen
2007Multi-party Indirect Indexing and Applications.
Matthew K. Franklin, Mark A. Gondree, Payman Mohassel
2007Obtaining Universally Compoable Security: Towards the Bare Bones of Trust.
Ran Canetti
2007On Efficient Message Authentication Via Block Cipher Design Techniques.
Goce Jakimoski, K. P. Subbalakshmi
2007On Privacy Models for RFID.
Serge Vaudenay
2007On Tweaking Luby-Rackoff Blockciphers.
David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
2007Relations Among Notions of Non-malleability for Encryption.
Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
2007Secure Protocols with Asymmetric Trust.
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen
2007Seven-Property-Preserving Iterated Hashing: ROX.
Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
2007Simple and Efficient Perfectly-Secure Asynchronous MPC.
Zuzana Beerliová-Trubíniová, Martin Hirt
2007Symmetric Key Cryptography on Modern Graphics Hardware.
Jason Yang, James Goodman
2007Two-Party Computing with Encrypted Data.
Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
2007When
Antoine Joux, David Naccache, Emmanuel Thomé