default search action
ASIACRYPT 2012: Beijing, China
- Xiaoyun Wang, Kazue Sako:
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Lecture Notes in Computer Science 7658, Springer 2012, ISBN 978-3-642-34960-7
Invited Talks
- Dan Boneh:
Pairing-Based Cryptography: Past, Present, and Future. 1 - Chuanming Zong:
Some Mathematical Mysteries in Lattices. 2-3
Public-Key Cryptography I
- Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. 4-24 - Michael Gerbush, Allison B. Lewko, Adam O'Neill, Brent Waters:
Dual Form Signatures: An Approach for Proving Security from Static Assumptions. 25-42 - Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi:
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397). 43-60 - Jae Hong Seo:
On the (Im)possibility of Projecting Property in Prime-Order Setting. 61-79
Foundation
- Jorge Luis Villar:
Optimal Reductions of Some Decisional Problems to the Rank Problem. 80-97 - Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel:
Signature Schemes Secure against Hard-to-Invert Leakage. 98-115 - Yehuda Lindell, Eran Omri, Hila Zarosim:
Completeness for Symmetric Two-Party Functionalities - Revisited. 116-133 - Mihir Bellare, Viet Tung Hoang, Phillip Rogaway:
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. 134-153 - Scott Ames, Rosario Gennaro, Muthuramakrishnan Venkitasubramaniam:
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions. 154-171
Symmetric Cipher
- Meicheng Liu, Yin Zhang, Dongdai Lin:
Perfect Algebraic Immune Functions. 172-189 - Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Differential Analysis of the LED Block Cipher. 190-207 - Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. 208-225 - Gaëtan Leurent:
Analysis of Differential Attacks in ARX Constructions. 226-243 - Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang:
Integral and Multidimensional Linear Distinguishers with Correlation Zero. 244-261 - Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling:
Differential Attacks against Stream Cipher ZUC. 262-277
Security Proof
- Rodolphe Lampe, Jacques Patarin, Yannick Seurin:
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. 278-295 - Liting Zhang, Wenling Wu, Han Sui, Peng Wang:
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. 296-312 - Dimitar Jetchev, Onur Özen, Martijn Stam:
Understanding Adaptivity: Random Systems Revisited. 313-330 - Mihir Bellare, Kenneth G. Paterson, Susan Thomson:
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. 331-348
Public-Key Cryptography II
- Tatsuaki Okamoto, Katsuyuki Takashima:
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. 349-366 - Nuttapong Attrapadung, Benoît Libert, Thomas Peters:
Computing on Authenticated Data: New Privacy Definitions and Constructions. 367-385 - Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn:
A Coding-Theoretic Approach to Recovering Noisy RSA Keys. 386-403 - Saqib A. Kakvi, Eike Kiltz, Alexander May:
Certifying RSA. 404-414
Lattice-Based Cryptography and Number Theory
- Léo Ducas, Phong Q. Nguyen:
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic. 415-432 - Léo Ducas, Phong Q. Nguyen:
Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures. 433-450 - Christophe Petit, Jean-Jacques Quisquater:
On Polynomial Systems Arising from a Weil Descent. 451-466
Public-Key Cryptography III
- Joppe W. Bos, Thorsten Kleinjung:
ECM at Work. 467-484 - Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento:
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem. 485-503
Hash Function
- Jooyoung Lee:
Provable Security of the Knudsen-Preneel Compression Functions. 504-525 - Bart Mennink:
Optimal Collision Security in Double Block Length Hashing with Single Length Key. 526-543 - Dmitry Khovratovich:
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings. 544-561 - Yu Sasaki, Lei Wang, Shuang Wu, Wenling Wu:
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. 562-579 - Thomas Peyrin, Yu Sasaki, Lei Wang:
Generic Related-Key Attacks for HMAC. 580-597
Cryptographic Protocol I
- Takaaki Mizuki, Michihito Kumamoto, Hideaki Sone:
The Five-Card Trick Can Be Done with Four Cards. 598-606 - Shahram Khazaei, Tal Moran, Douglas Wikström:
A Mix-Net from Any CCA2 Secure Cryptosystem. 607-625 - David Bernhard, Olivier Pereira, Bogdan Warinschi:
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. 626-643
Cryptographic Protocol II
- Kyle Brogle, Sharon Goldberg, Leonid Reyzin:
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract). 644-662 - Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes:
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise. 663-680 - Gilad Asharov, Claudio Orlandi:
Calling Out Cheaters: Covert Security with Public Verifiability. 681-698 - Rafael Pass, Huijia Lin, Muthuramakrishnan Venkitasubramaniam:
A Unified Framework for UC from Only OT. 699-717
Implementation Issues
- Patrick Longa, Francesco Sica:
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. 718-739 - Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, François-Xavier Standaert:
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. 740-757 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede:
Theory and Practice of a Leakage Resilient Masking Scheme. 758-775
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.