ASIACRYPT A

35 papers

YearTitle / Authors
2008A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting.
Jason Keller, Joe Kilian
2008A Modular Security Analysis of the TLS Handshake Protocol.
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
2008A New Attack on the LEX Stream Cipher.
Orr Dunkelman, Nathan Keller
2008Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings
Josef Pieprzyk
2008Ambiguous Optimistic Fair Exchange.
Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
2008An Improved Impossible Differential Attack on MISTY1.
Orr Dunkelman, Nathan Keller
2008An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity.
Claude Carlet, Keqin Feng
2008Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography.
Ueli M. Maurer, Stefano Tessaro
2008Breaking the F-FCSR-H Stream Cipher in Real Time.
Martin Hell, Thomas Johansson
2008Chosen Ciphertext Security with Optimal Ciphertext Overhead.
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
2008Compact Proofs of Retrievability.
Hovav Shacham, Brent Waters
2008Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems.
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
2008Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks.
Jung-Keun Lee, Dong Hoon Lee, Sangwoo Park
2008Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.
Goichiro Hanaoka, Kaoru Kurosawa
2008Efficient Protocols for Set Membership and Range Proofs.
Jan Camenisch, Rafik Chaabouni, Abhi Shelat
2008Generalized Identity Based and Broadcast Encryption Schemes.
Dan Boneh, Michael Hamburg
2008Graph Design for Secure Multiparty Computation over Non-Abelian Groups.
Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tartary
2008Hash Functions from Sigma Protocols and Improvements to VSH.
Mihir Bellare, Todor Ristov
2008How to Fill Up Merkle-Damgård Hash Functions.
Kan Yasuda
2008Limits of Constructive Security Proofs.
Michael Backes, Dominique Unruh
2008MPC vs. SFE : Unconditional and Computational Security.
Martin Hirt, Ueli M. Maurer, Vassilis Zikas
2008OAEP Is Secure under Key-Dependent Messages.
Michael Backes, Markus Dürmuth, Dominique Unruh
2008On the Security of HB# against a Man-in-the-Middle Attack.
Khaled Ouafi, Raphael Overbeck, Serge Vaudenay
2008On the Validity of the phi-Hiding Assumption in Cryptographic Protocols.
Christian Schridde, Bernd Freisleben
2008Preimage Attacks on 3, 4, and 5-Pass HAVAL.
Yu Sasaki, Kazumaro Aoki
2008Rigorous and Efficient Short Lattice Vectors Enumeration.
Xavier Pujol, Damien Stehlé
2008Slide Attacks on a Class of Hash Functions.
Michael Gorski, Stefan Lucks, Thomas Peyrin
2008Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits.
Mathias Herrmann, Alexander May
2008Some Perspectives on Complexity-Based Cryptography.
Andrew Chi-Chih Yao
2008Speeding Up the Pollard Rho Method on Prime Fields.
Jung Hee Cheon, Jin Hong, Minkyu Kim
2008Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes.
Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang
2008Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi
2008Towards Robust Computation on Encrypted Data.
Manoj Prabhakaran, Mike Rosulek
2008Twisted Edwards Curves Revisited.
Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2008Universally Composable Adaptive Oblivious Transfer.
Matthew Green, Susan Hohenberger