


default search action
ASIACRYPT 2008: Melbourne, Australia
- Josef Pieprzyk:
Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings. Lecture Notes in Computer Science 5350, Springer 2008, ISBN 978-3-540-89254-0
Multi-Party Computation
- Martin Hirt, Ueli M. Maurer, Vassilis Zikas:
MPC vs. SFE : Unconditional and Computational Security. 1-18 - Zhifang Zhang, Mulan Liu, Yeow Meng Chee
, San Ling
, Huaxiong Wang:
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. 19-36 - Xiaoming Sun
, Andrew Chi-Chih Yao, Christophe Tartary:
Graph Design for Secure Multiparty Computation over Non-Abelian Groups. 37-53
Invited Talk
- Andrew Chi-Chih Yao:
Some Perspectives on Complexity-Based Cryptography. 54
Cryptographic Protocols I
- Paul Morrissey, Nigel P. Smart, Bogdan Warinschi:
A Modular Security Analysis of the TLS Handshake Protocol. 55-73 - Qiong Huang, Guomin Yang
, Duncan S. Wong, Willy Susilo
:
Ambiguous Optimistic Fair Exchange. 74-89 - Hovav Shacham, Brent Waters:
Compact Proofs of Retrievability. 90-107 - Khaled Ouafi, Raphael Overbeck, Serge Vaudenay:
On the Security of HB# against a Man-in-the-Middle Attack. 108-124
Cryptographic Hash Functions I
- Mihir Bellare, Todor Ristov:
Hash Functions from Sigma Protocols and Improvements to VSH. 125-142 - Michael Gorski, Stefan Lucks, Thomas Peyrin:
Slide Attacks on a Class of Hash Functions. 143-160 - Ueli M. Maurer, Stefano Tessaro:
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. 161-178
Cryptographic Protocols II
- Matthew Green, Susan Hohenberger:
Universally Composable Adaptive Oblivious Transfer. 179-197 - Jason Keller, Joe Kilian:
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting. 198-215 - Manoj Prabhakaran, Mike Rosulek:
Towards Robust Computation on Encrypted Data. 216-233 - Jan Camenisch, Rafik Chaabouni, Abhi Shelat:
Efficient Protocols for Set Membership and Range Proofs. 234-252
Cryptographic Hash Functions II
- Yu Sasaki, Kazumaro Aoki:
Preimage Attacks on 3, 4, and 5-Pass HAVAL. 253-271 - Kan Yasuda:
How to Fill Up Merkle-Damgård Hash Functions. 272-289 - Michael Backes, Dominique Unruh
:
Limits of Constructive Security Proofs. 290-307
Public-Key Cryptography I
- Goichiro Hanaoka, Kaoru Kurosawa:
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. 308-325 - Hüseyin Hisil, Kenneth Koon-Ho Wong
, Gary Carter, Ed Dawson
:
Twisted Edwards Curves Revisited. 326-343 - Christian Schridde, Bernd Freisleben
:
On the Validity of the phi-Hiding Assumption in Cryptographic Protocols. 344-354 - Masayuki Abe, Eike Kiltz
, Tatsuaki Okamoto:
Chosen Ciphertext Security with Optimal Ciphertext Overhead. 355-371
Lattice-Based Cryptography
- Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
:
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. 372-389 - Xavier Pujol, Damien Stehlé:
Rigorous and Efficient Short Lattice Vectors Enumeration. 390-405 - Mathias Herrmann, Alexander May
:
Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits. 406-424
Private-Key Cryptography
- Claude Carlet, Keqin Feng:
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. 425-440 - Orr Dunkelman, Nathan Keller:
An Improved Impossible Differential Attack on MISTY1. 441-454
Public-Key Cryptography II
- Dan Boneh, Michael Hamburg:
Generalized Identity Based and Broadcast Encryption Schemes. 455-470 - Jung Hee Cheon, Jin Hong
, Minkyu Kim:
Speeding Up the Pollard Rho Method on Prime Fields. 471-488 - Andy Rupp, Gregor Leander
, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi:
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. 489-505 - Michael Backes, Markus Dürmuth, Dominique Unruh
:
OAEP Is Secure under Key-Dependent Messages. 506-523
Analysis of Stream Ciphers
- Jung-Keun Lee, Dong Hoon Lee, Sangwoo Park:
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. 524-538 - Orr Dunkelman, Nathan Keller:
A New Attack on the LEX Stream Cipher. 539-556 - Martin Hell
, Thomas Johansson:
Breaking the F-FCSR-H Stream Cipher in Real Time. 557-569

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.