


default search action
ASIACRYPT 2007: Kuching, Malaysia
- Kaoru Kurosawa:

Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings. Lecture Notes in Computer Science 4833, Springer 2007, ISBN 978-3-540-76899-9
Number Theory and Elliptic Curve
- Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik:

A Kilobit Special Number Field Sieve Factorization. 1-12 - Antoine Joux

, David Naccache, Emmanuel Thomé
:
When e-th Roots Become Easier Than Factoring. 13-28 - Daniel J. Bernstein, Tanja Lange:

Faster Addition and Doubling on Elliptic Curves. 29-50
Protocol
- Jens Groth, Steve Lu:

A Non-interactive Shuffle with Pairing Based Verifiability. 51-67 - Serge Vaudenay:

On Privacy Models for RFID. 68-87
Invited Talk I
- Ran Canetti:

Obtaining Universally Compoable Security: Towards the Bare Bones of Trust. 88-112
Hash Function Design
- Shoichi Hirose, Je Hong Park, Aaram Yun:

A Simple Variant of the Merkle-Damgård Scheme with a Permutation. 113-129 - Elena Andreeva

, Gregory Neven, Bart Preneel, Thomas Shrimpton:
Seven-Property-Preserving Iterated Hashing: ROX. 130-146 - Thomas Ristenpart, Thomas Shrimpton:

How to Build a Hash Function from Any Collision-Resistant Function. 147-163
Group/Broadcast Cryptography
- Jens Groth

:
Fully Anonymous Group Signatures Without Random Oracles. 164-180 - Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:

Group Encryption. 181-199 - Cécile Delerablée:

Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. 200-215
MAC and Implementation
- Kan Yasuda:

Boosting Merkle-Damgård Hashing for Message Authentication. 216-231 - Goce Jakimoski, K. P. Subbalakshmi

:
On Efficient Message Authentication Via Block Cipher Design Techniques. 232-248 - Jason Yang, James Goodman:

Symmetric Key Cryptography on Modern Graphics Hardware. 249-264
Multiparty Computation I
- Matthew Green, Susan Hohenberger:

Blind Identity-Based Encryption and Simulatable Oblivious Transfer. 265-282 - Matthew K. Franklin, Mark A. Gondree

, Payman Mohassel:
Multi-party Indirect Indexing and Applications. 283-297 - Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung:

Two-Party Computing with Encrypted Data. 298-314
Block Ciphers
- Lars R. Knudsen, Vincent Rijmen:

Known-Key Distinguishers for Some Block Ciphers. 315-324 - Jacques Patarin, Valérie Nachef, Côme Berbain:

Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. 325-341 - David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu:

On Tweaking Luby-Rackoff Blockciphers. 342-356
Multiparty Computation II
- Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen

:
Secure Protocols with Asymmetric Trust. 357-375 - Zuzana Beerliová-Trubíniová, Martin Hirt:

Simple and Efficient Perfectly-Secure Asynchronous MPC. 376-392 - Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser:

Efficient Byzantine Agreement with Faulty Minority. 393-409 - Anne Broadbent, Alain Tapp:

Information-Theoretic Security Without an Honest Majority. 410-426
Foundation
- Ueli M. Maurer, Dominik Raub:

Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. 427-443 - Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai:

Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. 444-459 - Gilles Brassard, Anne Broadbent, Joseph F. Fitzsimons, Sébastien Gambs, Alain Tapp:

Anonymous Quantum Communication. 460-473
Invited Talk II
- Tatsuaki Okamoto:

Authenticated Key Exchange and Key Encapsulation in the Standard Model. 474-484
Public Key Encryption
- Xavier Boyen:

Miniature CCA2 PK Encryption: Tight Security Without Redundancy. 485-501 - Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz

, Rafael Pass
, Abhi Shelat, Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption. 502-518 - Rafael Pass

, Abhi Shelat, Vinod Vaikuntanathan:
Relations Among Notions of Non-malleability for Encryption. 519-535
Cryptanalysis
- Florian Mendel

, Vincent Rijmen:
Cryptanalysis of the Tiger Hash Function. 536-550 - Thomas Peyrin:

Cryptanalysis of Grindahl. 551-567 - Martin Hell, Thomas Johansson

:
A Key Recovery Attack on Edon80. 568-581

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














