Cryptographers' World
 

ASIACRYPT 2008


[Sort by page number] [Sort by citations count]

 
Josef Pieprzyk, editor, Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-89254-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Martin Hirt,  Ueli M. Maurer,  Vassilis Zikas,  MPC vs. SFE : Unconditional and Computational Security, pp. 1 - 18, ASIACRYPT 2008.

[Electronic Edition][Cited 4 times ]

Zhifang Zhang,  Mulan Liu,  Yeow Meng Chee,  San Ling,  Huaxiong Wang,  Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes, pp. 19 - 36, ASIACRYPT 2008.

[Electronic Edition][Cited 2 times ]

Xiaoming Sun,  Andrew Chi-Chih Yao,  Christophe Tartary,  Graph Design for Secure Multiparty Computation over Non-Abelian Groups, pp. 37 - 53, ASIACRYPT 2008.

[Electronic Edition][No citation]

Andrew Chi-Chih Yao,  Some Perspectives on Complexity-Based Cryptography, pp. 54 - 54, ASIACRYPT 2008.

[Electronic Edition][No citation]

Paul Morrissey,  Nigel P. Smart,  Bogdan Warinschi,  A Modular Security Analysis of the TLS Handshake Protocol, pp. 55 - 73, ASIACRYPT 2008.

[Electronic Edition][Cited 10 times ]

Qiong Huang,  Guomin Yang,  Duncan S. Wong,  Willy Susilo,  Ambiguous Optimistic Fair Exchange, pp. 74 - 89, ASIACRYPT 2008.

[Electronic Edition][Cited 7 times ]

Hovav Shacham,  Brent Waters,  Compact Proofs of Retrievability, pp. 90 - 107, ASIACRYPT 2008.

[Electronic Edition][Cited 53 times Red Star]

Khaled Ouafi,  Raphael Overbeck,  Serge Vaudenay,  On the Security of HB# against a Man-in-the-Middle Attack, pp. 108 - 124, ASIACRYPT 2008.

[Electronic Edition][Cited 19 times ]

Mihir Bellare,  Todor Ristov,  Hash Functions from Sigma Protocols and Improvements to VSH, pp. 125 - 142, ASIACRYPT 2008.

[Electronic Edition][Cited 5 times ]

Michael Gorski,  Stefan Lucks,  Thomas Peyrin,  Slide Attacks on a Class of Hash Functions, pp. 143 - 160, ASIACRYPT 2008.

[Electronic Edition][Cited 12 times ]

Ueli M. Maurer,  Stefano Tessaro,  Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography, pp. 161 - 178, ASIACRYPT 2008.

[Electronic Edition][Cited 2 times ]

Matthew Green,  Susan Hohenberger,  Universally Composable Adaptive Oblivious Transfer, pp. 179 - 197, ASIACRYPT 2008.

[Electronic Edition][Cited 21 times ]

Jason Keller,  Joe Kilian,  A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting, pp. 198 - 215, ASIACRYPT 2008.

[Electronic Edition][Cited 2 times ]

Manoj Prabhakaran,  Mike Rosulek,  Towards Robust Computation on Encrypted Data, pp. 216 - 233, ASIACRYPT 2008.

[Electronic Edition][Cited 2 times ]

Jan Camenisch,  Rafik Chaabouni,  Abhi Shelat,  Efficient Protocols for Set Membership and Range Proofs, pp. 234 - 252, ASIACRYPT 2008.

[Electronic Edition][Cited 14 times ]

Yu Sasaki,  Kazumaro Aoki,  Preimage Attacks on 3, 4, and 5-Pass HAVAL, pp. 253 - 271, ASIACRYPT 2008.

[Electronic Edition][Cited 20 times ]

Kan Yasuda,  How to Fill Up Merkle-DamgÃ¥rd Hash Functions, pp. 272 - 289, ASIACRYPT 2008.

[Electronic Edition][Cited 10 times ]

Michael Backes,  Dominique Unruh,  Limits of Constructive Security Proofs, pp. 290 - 307, ASIACRYPT 2008.

[Electronic Edition][No citation]

Goichiro Hanaoka,  Kaoru Kurosawa,  Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption, pp. 308 - 325, ASIACRYPT 2008.

[Electronic Edition][Cited 31 times ]

Hüseyin Hisil,  Kenneth Koon-Ho Wong,  Gary Carter,  Ed Dawson,  Twisted Edwards Curves Revisited, pp. 326 - 343, ASIACRYPT 2008.

[Electronic Edition][Cited 14 times ]

Christian Schridde,  Bernd Freisleben,  On the Validity of the phi-Hiding Assumption in Cryptographic Protocols, pp. 344 - 354, ASIACRYPT 2008.

[Electronic Edition][No citation]

Masayuki Abe,  Eike Kiltz,  Tatsuaki Okamoto,  Chosen Ciphertext Security with Optimal Ciphertext Overhead, pp. 355 - 371, ASIACRYPT 2008.

[Electronic Edition][Cited 8 times ]

Akinori Kawachi,  Keisuke Tanaka,  Keita Xagawa,  Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems, pp. 372 - 389, ASIACRYPT 2008.

[Electronic Edition][Cited 11 times ]

Xavier Pujol,  Damien Stehlé,  Rigorous and Efficient Short Lattice Vectors Enumeration, pp. 390 - 405, ASIACRYPT 2008.

[Electronic Edition][Cited 17 times ]

Mathias Herrmann,  Alexander May,  Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits, pp. 406 - 424, ASIACRYPT 2008.

[Electronic Edition][Cited 10 times ]

Claude Carlet,  Keqin Feng,  An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity, pp. 425 - 440, ASIACRYPT 2008.

[Electronic Edition][Cited 23 times ]

Orr Dunkelman,  Nathan Keller,  An Improved Impossible Differential Attack on MISTY1, pp. 441 - 454, ASIACRYPT 2008.

[Electronic Edition][Cited 9 times ]

Dan Boneh,  Michael Hamburg,  Generalized Identity Based and Broadcast Encryption Schemes, pp. 455 - 470, ASIACRYPT 2008.

[Electronic Edition][Cited 22 times ]

Jung Hee Cheon,  Jin Hong,  Minkyu Kim,  Speeding Up the Pollard Rho Method on Prime Fields, pp. 471 - 488, ASIACRYPT 2008.

[Electronic Edition][Cited 8 times ]

Andy Rupp,  Gregor Leander,  Endre Bangerter,  Alexander W. Dent,  Ahmad-Reza Sadeghi,  Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems , pp. 489 - 505, ASIACRYPT 2008.

[Electronic Edition][Cited 4 times ]

Michael Backes,  Markus Dürmuth,  Dominique Unruh,  OAEP Is Secure under Key-Dependent Messages, pp. 506 - 523, ASIACRYPT 2008.

[Electronic Edition][Cited 9 times ]

Jung-Keun Lee,  Dong Hoon Lee,  Sangwoo Park,  Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks, pp. 524 - 538, ASIACRYPT 2008.

[Electronic Edition][Cited 4 times ]

Orr Dunkelman,  Nathan Keller,  A New Attack on the LEX Stream Cipher, pp. 539 - 556, ASIACRYPT 2008.

[Electronic Edition][Cited 3 times ]

Martin Hell,  Thomas Johansson,  Breaking the F-FCSR-H Stream Cipher in Real Time, pp. 557 - 569, ASIACRYPT 2008.

[Electronic Edition][Cited 20 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...