ASIACRYPT A

46 papers

YearTitle / Authors
20123kf9: Enhancing 3GPP-MAC beyond the Birthday Bound.
Liting Zhang, Wenling Wu, Han Sui, Peng Wang
2012A Coding-Theoretic Approach to Recovering Noisy RSA Keys.
Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn
2012A Mix-Net from Any CCA2 Secure Cryptosystem.
Shahram Khazaei, Tal Moran, Douglas Wikström
2012A Unified Framework for UC from Only OT.
Rafael Pass, Huijia Lin, Muthuramakrishnan Venkitasubramaniam
2012Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing.
Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
2012Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings
Xiaoyun Wang, Kazue Sako
2012An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher.
Rodolphe Lampe, Jacques Patarin, Yannick Seurin
2012Analysis of Differential Attacks in ARX Constructions.
Gaëtan Leurent
2012Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings.
Dmitry Khovratovich
2012Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397).
Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
2012Calling Out Cheaters: Covert Security with Public Verifiability.
Gilad Asharov, Claudio Orlandi
2012Certifying RSA.
Saqib A. Kakvi, Eike Kiltz, Alexander May
2012Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise.
Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes
2012Completeness for Symmetric Two-Party Functionalities - Revisited.
Yehuda Lindell, Eran Omri, Hila Zarosim
2012Computing on Authenticated Data: New Privacy Definitions and Constructions.
Nuttapong Attrapadung, Benoît Libert, Thomas Peters
2012Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2012Differential Analysis of the LED Block Cipher.
Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici
2012Differential Attacks against Stream Cipher ZUC.
Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling
2012Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
Michael Gerbush, Allison B. Lewko, Adam O'Neill, Brent Waters
2012ECM at Work.
Joppe W. Bos, Thorsten Kleinjung
2012Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic.
Léo Ducas, Phong Q. Nguyen
2012Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication.
Patrick Longa, Francesco Sica
2012Fully Secure Unbounded Inner-Product and Attribute-Based Encryption.
Tatsuaki Okamoto, Katsuyuki Takashima
2012Generic Related-Key Attacks for HMAC.
Thomas Peyrin, Yu Sasaki, Lei Wang
2012How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios.
David Bernhard, Olivier Pereira, Bogdan Warinschi
2012IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento
2012Integral and Multidimensional Linear Distinguishers with Correlation Zero.
Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang
2012Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks.
Yu Sasaki, Lei Wang, Shuang Wu, Wenling Wu
2012Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures.
Léo Ducas, Phong Q. Nguyen
2012On Polynomial Systems Arising from a Weil Descent.
Christophe Petit, Jean-Jacques Quisquater
2012On the (Im)possibility of Projecting Property in Prime-Order Setting.
Jae Hong Seo
2012Optimal Collision Security in Double Block Length Hashing with Single Length Key.
Bart Mennink
2012Optimal Reductions of Some Decisional Problems to the Rank Problem.
Jorge Luis Villar
2012PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin
2012Pairing-Based Cryptography: Past, Present, and Future.
Dan Boneh
2012Perfect Algebraic Immune Functions.
Meicheng Liu, Yin Zhang, Dongdai Lin
2012Provable Security of the Knudsen-Preneel Compression Functions.
Jooyoung Lee
2012RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures.
Mihir Bellare, Kenneth G. Paterson, Susan Thomson
2012Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract).
Kyle Brogle, Sharon Goldberg, Leonid Reyzin
2012Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note.
Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, François-Xavier Standaert
2012Signature Schemes Secure against Hard-to-Invert Leakage.
Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
2012Some Mathematical Mysteries in Lattices.
Chuanming Zong
2012The Five-Card Trick Can Be Done with Four Cards.
Takaaki Mizuki, Michihito Kumamoto, Hideaki Sone
2012The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions.
Scott Ames, Rosario Gennaro, Muthuramakrishnan Venkitasubramaniam
2012Theory and Practice of a Leakage Resilient Masking Scheme.
Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede
2012Understanding Adaptivity: Random Systems Revisited.
Dimitar Jetchev, Onur Özen, Martijn Stam