default search action
ASIACRYPT 2007: Kuching, Malaysia
- Kaoru Kurosawa:
Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings. Lecture Notes in Computer Science 4833, Springer 2007, ISBN 978-3-540-76899-9
Number Theory and Elliptic Curve
- Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik:
A Kilobit Special Number Field Sieve Factorization. 1-12 - Antoine Joux, David Naccache, Emmanuel Thomé:
When e-th Roots Become Easier Than Factoring. 13-28 - Daniel J. Bernstein, Tanja Lange:
Faster Addition and Doubling on Elliptic Curves. 29-50
Protocol
- Jens Groth, Steve Lu:
A Non-interactive Shuffle with Pairing Based Verifiability. 51-67 - Serge Vaudenay:
On Privacy Models for RFID. 68-87
Invited Talk I
- Ran Canetti:
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust. 88-112
Hash Function Design
- Shoichi Hirose, Je Hong Park, Aaram Yun:
A Simple Variant of the Merkle-Damgård Scheme with a Permutation. 113-129 - Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton:
Seven-Property-Preserving Iterated Hashing: ROX. 130-146 - Thomas Ristenpart, Thomas Shrimpton:
How to Build a Hash Function from Any Collision-Resistant Function. 147-163
Group/Broadcast Cryptography
- Jens Groth:
Fully Anonymous Group Signatures Without Random Oracles. 164-180 - Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Group Encryption. 181-199 - Cécile Delerablée:
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. 200-215
MAC and Implementation
- Kan Yasuda:
Boosting Merkle-Damgård Hashing for Message Authentication. 216-231 - Goce Jakimoski, K. P. Subbalakshmi:
On Efficient Message Authentication Via Block Cipher Design Techniques. 232-248 - Jason Yang, James Goodman:
Symmetric Key Cryptography on Modern Graphics Hardware. 249-264
Multiparty Computation I
- Matthew Green, Susan Hohenberger:
Blind Identity-Based Encryption and Simulatable Oblivious Transfer. 265-282 - Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Multi-party Indirect Indexing and Applications. 283-297 - Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung:
Two-Party Computing with Encrypted Data. 298-314
Block Ciphers
- Lars R. Knudsen, Vincent Rijmen:
Known-Key Distinguishers for Some Block Ciphers. 315-324 - Jacques Patarin, Valérie Nachef, Côme Berbain:
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. 325-341 - David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu:
On Tweaking Luby-Rackoff Blockciphers. 342-356
Multiparty Computation II
- Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen:
Secure Protocols with Asymmetric Trust. 357-375 - Zuzana Beerliová-Trubíniová, Martin Hirt:
Simple and Efficient Perfectly-Secure Asynchronous MPC. 376-392 - Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser:
Efficient Byzantine Agreement with Faulty Minority. 393-409 - Anne Broadbent, Alain Tapp:
Information-Theoretic Security Without an Honest Majority. 410-426
Foundation
- Ueli M. Maurer, Dominik Raub:
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. 427-443 - Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai:
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. 444-459 - Gilles Brassard, Anne Broadbent, Joseph F. Fitzsimons, Sébastien Gambs, Alain Tapp:
Anonymous Quantum Communication. 460-473
Invited Talk II
- Tatsuaki Okamoto:
Authenticated Key Exchange and Key Encapsulation in the Standard Model. 474-484
Public Key Encryption
- Xavier Boyen:
Miniature CCA2 PK Encryption: Tight Security Without Redundancy. 485-501 - Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption. 502-518 - Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan:
Relations Among Notions of Non-malleability for Encryption. 519-535
Cryptanalysis
- Florian Mendel, Vincent Rijmen:
Cryptanalysis of the Tiger Hash Function. 536-550 - Thomas Peyrin:
Cryptanalysis of Grindahl. 551-567 - Martin Hell, Thomas Johansson:
A Key Recovery Attack on Edon80. 568-581
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.