ASIACRYPT A

36 papers

YearTitle / Authors
2010A Byte-Based Guess and Determine Attack on SOSEMANUK.
Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, Dengguo Feng
2010A Closer Look at Anonymity and Robustness in Encryption Schemes.
Payman Mohassel
2010A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT.
Eric Brier, Thomas Peyrin
2010A Group Signature Scheme from Lattice Assumptions.
S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan
2010Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang
2010Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
Masayuki Abe
2010Collision Attacks against the Knudsen-Preneel Compression Functions.
Onur Özen, Martijn Stam
2010Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.
Carmit Hazay, Tomas Toft
2010Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems.
Simon Knellwolf, Willi Meier, María Naya-Plasencia
2010Constant-Size Commitments to Polynomials and Their Applications.
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
2010Efficient Public-Key Cryptography in the Presence of Key Leakage.
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs
2010Efficient String-Commitment from Weak Bit-Commitment.
Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang
2010Faster Fully Homomorphic Encryption.
Damien Stehlé, Ron Steinfeld
2010Finding Second Preimages of Short Messages for Hamsi-256.
Thomas Fuhr
2010General Perfectly Secure Message Transmission Using Linear Codes.
Qiushi Yang, Yvo Desmedt
2010Generic Compilers for Authenticated Key Exchange.
Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
2010Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.
Emmanuel Volte, Valérie Nachef, Jacques Patarin
2010Improved Single-Key Attacks on 8-Round AES-192 and AES-256.
Orr Dunkelman, Nathan Keller, Adi Shamir
2010Lattice-Based Blind Signatures.
Markus Rückert
2010Leakage Resilient ElGamal Encryption.
Eike Kiltz, Krzysztof Pietrzak
2010Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.
Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman
2010Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
2010Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition.
Chao Ning, Qiuliang Xu
2010Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl.
Yu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta
2010On Invertible Sampling and Adaptive Security.
Yuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi, Amit Sahai
2010On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields.
Robert Granger
2010Optimistic Concurrent Zero Knowledge.
Alon Rosen, Abhi Shelat
2010Random Oracles with(out) Programmability.
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro
2010Rotational Rebound Attacks on Reduced Skein.
Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger
2010Short Non-interactive Zero-Knowledge Proofs.
Jens Groth
2010Short Pairing-Based Non-interactive Zero-Knowledge Arguments.
Jens Groth
2010Structured Encryption and Controlled Disclosure.
Melissa Chase, Seny Kamara
2010The Degree of Regularity of HFE Systems.
Vivien Dubois, Nicolas Gama
2010The Round Complexity of Verifiable Secret Sharing: The Statistical Case.
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
2010The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.
Tibor Jager, Andy Rupp
2010The World Is Not Enough: Another Look on Second-Order DPA.
François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard