ASIACRYPT A

41 papers

YearTitle / Authors
2011A Framework for Practical Universally Composable Zero-Knowledge Protocols.
Jan Camenisch, Stephan Krenn, Victor Shoup
2011Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
Dong Hoon Lee, Xiaoyun Wang
2011An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
2011BKZ 2.0: Better Lattice Security Estimates.
Yuanmi Chen, Phong Q. Nguyen
2011BiTR: Built-in Tamper Resilience.
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
2011Biclique Cryptanalysis of the Full AES.
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
2011Bridging Broadcast Encryption and Group Key Agreement.
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs
2011Computational Verifiable Secret Sharing Revisited.
Michael Backes, Aniket Kate, Arpita Patra
2011Constant-Round Private Function Evaluation with Linear Complexity.
Jonathan Katz, Lior Malka
2011Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security.
Chao Ning, Qiuliang Xu
2011Counting Points on Genus 2 Curves with Real Multiplication.
Pierrick Gaudry, David R. Kohel, Benjamin A. Smith
2011Cryptanalysis of ARMADILLO2.
Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
2011Cryptography Secure against Related-Key Attacks and Tampering.
Mihir Bellare, David Cash, Rachel Miller
2011Decoding Random Linear Codes in $\tilde{\mathcal{O}}(2^{0.054n})$.
Alexander May, Alexander Meurer, Enrico Thomae
2011Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments.
Jens Groth
2011Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions.
Florian Mendel, Tomislav Nad, Martin Schläffer
2011Functional Encryption for Inner Product Predicates from Learning with Errors.
Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
2011Leakage-Resilient Cryptography from the Inner-Product Extractor.
Stefan Dziembowski, Sebastian Faust
2011Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.
Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud
2011Lower and Upper Bounds for Deniable Public-Key Encryption.
Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
2011Natural Generalizations of Threshold Secret Sharing.
Oriol Farràs, Carles Padró, Chaoping Xing, An Yang
2011Noiseless Database Privacy.
Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
2011Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Marc Fischlin, Benoît Libert, Mark Manulis
2011Oblivious RAM with O((logN)3) Worst-Case Cost.
Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Mingfei Li
2011On the Efficiency of Bit Commitment Reductions.
Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger
2011On the Joint Security of Encryption and Signature, Revisited.
Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
2011Polly Cracker, Revisited.
Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret
2011Practical Key-Recovery for All Possible Parameters of SFLASH.
Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat
2011Program Obfuscation with Leaky Hardware.
Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum
2011Random Oracles in a Quantum World.
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
2011Rebound Attack on JH42.
María Naya-Plasencia, Deniz Toz, Kerem Varici
2011Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge.
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung
2011Second-Order Differential Collisions for Reduced SHA-256.
Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolic
2011Secure Communication in Multicast Graphs.
Qiushi Yang, Yvo Desmedt
2011Separating Short Structure-Preserving Signatures from Non-interactive Assumptions.
Masayuki Abe, Jens Groth, Miyako Ohkubo
2011Short Signatures from Weaker Assumptions.
Dennis Hofheinz, Tibor Jager, Eike Kiltz
2011Structure Preserving CCA Secure Encryption and Applications.
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
2011Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol.
Kenneth G. Paterson, Thomas Ristenpart, Thomas Shrimpton
2011The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy.
Divesh Aggarwal, Ueli Maurer
2011The Preimage Security of Double-Block-Length Compression Functions.
Frederik Armknecht, Ewan Fleischmann, Matthias Krause, Jooyoung Lee, Martijn Stam, John P. Steinberger
2011Two Provers in Isolation.
Claude Crépeau, Louis Salvail, Jean-Raymond Simard, Alain Tapp