


default search action
ASIACRYPT 2008: Melbourne, Australia
- Josef Pieprzyk:

Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings. Lecture Notes in Computer Science 5350, Springer 2008, ISBN 978-3-540-89254-0
Multi-Party Computation
- Martin Hirt, Ueli M. Maurer, Vassilis Zikas:

MPC vs. SFE : Unconditional and Computational Security. 1-18 - Zhifang Zhang, Mulan Liu, Yeow Meng Chee

, San Ling
, Huaxiong Wang:
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. 19-36 - Xiaoming Sun

, Andrew Chi-Chih Yao, Christophe Tartary:
Graph Design for Secure Multiparty Computation over Non-Abelian Groups. 37-53
Invited Talk
- Andrew Chi-Chih Yao:

Some Perspectives on Complexity-Based Cryptography. 54
Cryptographic Protocols I
- Paul Morrissey, Nigel P. Smart, Bogdan Warinschi:

A Modular Security Analysis of the TLS Handshake Protocol. 55-73 - Qiong Huang, Guomin Yang

, Duncan S. Wong, Willy Susilo
:
Ambiguous Optimistic Fair Exchange. 74-89 - Hovav Shacham, Brent Waters:

Compact Proofs of Retrievability. 90-107 - Khaled Ouafi, Raphael Overbeck, Serge Vaudenay:

On the Security of HB# against a Man-in-the-Middle Attack. 108-124
Cryptographic Hash Functions I
- Mihir Bellare, Todor Ristov:

Hash Functions from Sigma Protocols and Improvements to VSH. 125-142 - Michael Gorski, Stefan Lucks, Thomas Peyrin:

Slide Attacks on a Class of Hash Functions. 143-160 - Ueli M. Maurer, Stefano Tessaro:

Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. 161-178
Cryptographic Protocols II
- Matthew Green, Susan Hohenberger:

Universally Composable Adaptive Oblivious Transfer. 179-197 - Jason Keller, Joe Kilian:

A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting. 198-215 - Manoj Prabhakaran, Mike Rosulek:

Towards Robust Computation on Encrypted Data. 216-233 - Jan Camenisch, Rafik Chaabouni, Abhi Shelat:

Efficient Protocols for Set Membership and Range Proofs. 234-252
Cryptographic Hash Functions II
- Yu Sasaki, Kazumaro Aoki:

Preimage Attacks on 3, 4, and 5-Pass HAVAL. 253-271 - Kan Yasuda:

How to Fill Up Merkle-Damgård Hash Functions. 272-289 - Michael Backes, Dominique Unruh

:
Limits of Constructive Security Proofs. 290-307
Public-Key Cryptography I
- Goichiro Hanaoka, Kaoru Kurosawa:

Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. 308-325 - Hüseyin Hisil

, Kenneth Koon-Ho Wong
, Gary Carter, Ed Dawson
:
Twisted Edwards Curves Revisited. 326-343 - Christian Schridde, Bernd Freisleben

:
On the Validity of the phi-Hiding Assumption in Cryptographic Protocols. 344-354 - Masayuki Abe, Eike Kiltz

, Tatsuaki Okamoto:
Chosen Ciphertext Security with Optimal Ciphertext Overhead. 355-371
Lattice-Based Cryptography
- Akinori Kawachi, Keisuke Tanaka, Keita Xagawa

:
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. 372-389 - Xavier Pujol, Damien Stehlé:

Rigorous and Efficient Short Lattice Vectors Enumeration. 390-405 - Mathias Herrmann, Alexander May

:
Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits. 406-424
Private-Key Cryptography
- Claude Carlet, Keqin Feng:

An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. 425-440 - Orr Dunkelman, Nathan Keller:

An Improved Impossible Differential Attack on MISTY1. 441-454
Public-Key Cryptography II
- Dan Boneh, Michael Hamburg:

Generalized Identity Based and Broadcast Encryption Schemes. 455-470 - Jung Hee Cheon, Jin Hong

, Minkyu Kim:
Speeding Up the Pollard Rho Method on Prime Fields. 471-488 - Andy Rupp, Gregor Leander

, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi:
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. 489-505 - Michael Backes, Markus Dürmuth, Dominique Unruh

:
OAEP Is Secure under Key-Dependent Messages. 506-523
Analysis of Stream Ciphers
- Jung-Keun Lee, Dong Hoon Lee, Sangwoo Park:

Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. 524-538 - Orr Dunkelman, Nathan Keller:

A New Attack on the LEX Stream Cipher. 539-556 - Martin Hell

, Thomas Johansson:
Breaking the F-FCSR-H Stream Cipher in Real Time. 557-569

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














