Cryptographers' World
 

ASIACRYPT 2005


[Sort by page number] [Sort by citations count]

 
Bimal K. Roy, editor, Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings. Springer, 2005. ISBN 3-540-30684-6.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Pascal Paillier,  Damien Vergnaud,  Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log, pp. 1 - 20, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 36 times ]

David Jao,  Stephen D. Miller,  Ramarathnam Venkatesan,  Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?, pp. 21 - 40, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

Phong Q. Nguyen,  Jacques Stern,  Adapting Density Attacks to Low-Weight Knapsacks, pp. 41 - 58, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 26 times ]

Vassil S. Dimitrov,  Laurent Imbert,  Pradeep Kumar Mishra,  Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains, pp. 59 - 78, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 72 times Red Star]

Martin Hirt,  Jesper Buus Nielsen,  Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation, pp. 79 - 99, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

Nuttapong Attrapadung,  Hideki Imai,  Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations, pp. 100 - 120, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 13 times ]

Andreas Jakoby,  Maciej Liskiewicz,  Revealing Additional Information in Two-Party Computations, pp. 121 - 135, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 2 times ]

Vladimir Kolesnikov,  Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation, pp. 136 - 155, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

Zhifang Zhang,  Mulan Liu,  Liangliang Xiao,  Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes, pp. 156 - 173, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

Moses Liskov,  Updatable Zero-Knowledge Databases, pp. 174 - 198, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

Renato Renner,  Stefan Wolf,  Simple and Tight Bounds for Information Reconciliation and Privacy Amplification, pp. 199 - 216, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

Matthias Christandl,  Stephanie Wehner,  Quantum Anonymous Transmissions, pp. 217 - 235, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

Justin Brickell,  Vitaly Shmatikov,  Privacy-Preserving Graph Algorithms in the Semi-honest Model, pp. 236 - 252, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

James Aspnes,  Zoë Diamadi,  Kristian Gjøsteen,  René Peralta,  Aleksandr Yampolskiy,  Spreading Alerts Quietly and the Subgroup Escape Problem, pp. 253 - 272, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

Douglas Wikström,  A Sender Verifiable Mix-Net and a New Proof of a Shuffle, pp. 273 - 292, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 28 times ]

Ryotaro Hayashi,  Keisuke Tanaka,  Universally Anonymizable Public-Key Encryption, pp. 293 - 312, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 2 times ]

Alexander Maximov,  Thomas Johansson,  Fast Computation of Large Distributions and Its Cryptographic Applications, pp. 313 - 332, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

Carlos Cid,  Gaëtan Leurent,  An Analysis of the XSL Algorithm, pp. 333 - 352, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 55 times Red Star]

Jin Hong,  Palash Sarkar,  New Applications of Time Memory Data Tradeoffs, pp. 353 - 372, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

Frédéric Muller,  Thomas Peyrin,  Linear Cryptanalysis of the TSC Family of Stream Ciphers, pp. 373 - 394, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

Itsik Mantin,  A Practical Attack on the Fixed RC4 in the WEP Mode, pp. 395 - 411, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 28 times ]

Joydip Mitra,  A Near-Practical Attack Against B Mode of HBB, pp. 412 - 424, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

Sébastien Kunz-Jacques,  Frédéric Muller,  New Improvements of Davies-Murphy Cryptanalysis, pp. 425 - 442, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

Eli Biham,  Orr Dunkelman,  Nathan Keller,  A Related-Key Rectangle Attack on the Full KASUMI, pp. 443 - 461, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

Lars R. Knudsen,  Frédéric Muller,  Some Attacks Against a Double Length Hash Proposal, pp. 462 - 473, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

Stefan Lucks,  A Failure-Friendly Design Principle for Hash Functions, pp. 474 - 494, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 128 times Red StarRed Star]

Yumiko Hanaoka,  Goichiro Hanaoka,  Junji Shikata,  Hideki Imai,  Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application, pp. 495 - 514, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

Paulo S. L. M. Barreto,  Benoît Libert,  Noel McCullagh,  Jean-Jacques Quisquater,  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps, pp. 515 - 532, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 179 times Red StarRed Star]

Toru Nakanishi,  Nobuo Funabiki,  Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps, pp. 533 - 548, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

Caroline Kudla,  Kenneth G. Paterson,  Modular Security Proofs for Key Agreement Protocols, pp. 549 - 565, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 48 times ]

Michel Abdalla,  Olivier Chevassut,  Pierre-Alain Fouque,  David Pointcheval,  A Simple Threshold Authenticated Key Exchange from Short Secrets, pp. 566 - 584, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

Kim-Kwang Raymond Choo,  Colin Boyd,  Yvonne Hitchcock,  Examining Indistinguishability-Based Proof Models for Key Establishment Protocols, pp. 585 - 604, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 84 times Red Star]

Marc Girault,  David Lefranc,  Server-Aided Verification: Theory and Practice, pp. 605 - 623, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

Kim-Kwang Raymond Choo,  Colin Boyd,  Yvonne Hitchcock,  Errors in Computational Complexity Proofs for Protocols, pp. 624 - 643, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 55 times Red Star]

Joonsang Baek,  Reihaneh Safavi-Naini,  Willy Susilo,  Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature), pp. 644 - 661, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 30 times ]

Craig Gentry,  David Molnar,  Zulfikar Ramzan,  Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs, pp. 662 - 681, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

Fabien Laguillaumie,  Pascal Paillier,  Damien Vergnaud,  Universally Convertible Directed Signatures, pp. 682 - 701, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...