ASIACRYPT A

42 papers

YearTitle / Authors
2009A Framework for Universally Composable Non-committing Blind Signatures.
Masayuki Abe, Miyako Ohkubo
2009A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.
Anja Lehmann, Stefano Tessaro
2009Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
Mitsuru Matsui
2009Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
Mathias Herrmann, Alexander May
2009Cache-Timing Template Attacks.
Billy Bob Brumley, Risto M. Hakala
2009Cascade Encryption Revisited.
Peter Gazi, Ueli M. Maurer
2009Cryptanalysis of the Square Cryptosystems.
Olivier Billet, Gilles Macario-Rat
2009Efficient Public Key Encryption Based on Ideal Lattices.
Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
2009Factoring
Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie, Phong Q. Nguyen
2009Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures.
Vadim Lyubashevsky
2009Foundations of Non-malleable Hash and One-Way Functions.
Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
2009Group Encryption: Non-interactive Realization in the Standard Model.
Julien Cathalo, Benoît Libert, Moti Yung
2009Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek
2009Hierarchical Predicate Encryption for Inner-Products.
Tatsuaki Okamoto, Katsuyuki Takashima
2009How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!
Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2009Improved Cryptanalysis of Skein.
Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varici
2009Improved Generic Algorithms for 3-Collisions.
Antoine Joux, Stefan Lucks
2009Improved Non-committing Encryption with Applications to Adaptively Secure Protocols.
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
2009Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
2009MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners.
Florian Mendel, Christian Rechberger, Martin Schläffer
2009Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls
2009Non-malleable Statistically Hiding Commitment from Any One-Way Function.
Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma
2009On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations.
Jonathan Katz, Arkady Yerukhimovich
2009On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Tibor Jager, Jörg Schwenk
2009On the Power of Two-Party Quantum Cryptography.
Louis Salvail, Christian Schaffner, Miroslava Sotáková
2009PSS Is Secure against Random Fault Attacks.
Jean-Sébastien Coron, Avradip Mandal
2009Preimages for Step-Reduced SHA-2.
Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang
2009Proofs of Storage from Homomorphic Identification Protocols.
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
2009Quantum-Secure Coin-Flipping and Applications.
Ivan Damgård, Carolin Lunemann
2009Rebound Attack on the Full Lane Compression Function.
Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer
2009Rebound Distinguishers: Results on the Full Whirlpool Compression Function.
Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
2009Related-Key Cryptanalysis of the Full AES-192 and AES-256.
Alex Biryukov, Dmitry Khovratovich
2009Secure Multi-party Computation Minimizing Online Rounds.
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung
2009Secure Two-Party Computation Is Practical.
Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams
2009Security Bounds for the Design of Code-Based Cryptosystems.
Matthieu Finiasz, Nicolas Sendrier
2009Security Notions and Generic Constructions for Client Puzzles.
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
2009Signature Schemes with Bounded Leakage Resilience.
Jonathan Katz, Vinod Vaikuntanathan
2009Simple Adaptive Oblivious Transfer without Random Oracle.
Kaoru Kurosawa, Ryo Nojima
2009Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices.
Jonathan Katz, Vinod Vaikuntanathan
2009The Intel AES Instructions Set and the SHA-3 Candidates.
Ryad Benadjila, Olivier Billet, Shay Gueron, Matthew J. B. Robshaw
2009The Key-Dependent Attack on Block Ciphers.
Xiaorui Sun, Xuejia Lai
2009Zero Knowledge in the Random Oracle Model, Revisited.
Hoeteck Wee