


default search action
ASIACRYPT 2012: Beijing, China
- Xiaoyun Wang, Kazue Sako:

Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Lecture Notes in Computer Science 7658, Springer 2012, ISBN 978-3-642-34960-7
Invited Talks
- Dan Boneh:

Pairing-Based Cryptography: Past, Present, and Future. 1 - Chuanming Zong:

Some Mathematical Mysteries in Lattices. 2-3
Public-Key Cryptography I
- Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss

, Ryo Nishimaki, Miyako Ohkubo:
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. 4-24 - Michael Gerbush, Allison B. Lewko, Adam O'Neill, Brent Waters:

Dual Form Signatures: An Approach for Proving Security from Static Assumptions. 25-42 - Takuya Hayashi

, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi:
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397). 43-60 - Jae Hong Seo

:
On the (Im)possibility of Projecting Property in Prime-Order Setting. 61-79
Foundation
- Jorge Luis Villar

:
Optimal Reductions of Some Decisional Problems to the Rank Problem. 80-97 - Sebastian Faust, Carmit Hazay

, Jesper Buus Nielsen
, Peter Sebastian Nordholt, Angela Zottarel:
Signature Schemes Secure against Hard-to-Invert Leakage. 98-115 - Yehuda Lindell

, Eran Omri
, Hila Zarosim:
Completeness for Symmetric Two-Party Functionalities - Revisited. 116-133 - Mihir Bellare, Viet Tung Hoang, Phillip Rogaway:

Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. 134-153 - Scott Ames, Rosario Gennaro, Muthuramakrishnan Venkitasubramaniam:

The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions. 154-171
Symmetric Cipher
- Meicheng Liu, Yin Zhang, Dongdai Lin:

Perfect Algebraic Immune Functions. 172-189 - Florian Mendel

, Vincent Rijmen
, Deniz Toz, Kerem Varici:
Differential Analysis of the LED Block Cipher. 190-207 - Julia Borghoff, Anne Canteaut, Tim Güneysu

, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen
, Gregor Leander
, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. 208-225 - Gaëtan Leurent

:
Analysis of Differential Attacks in ARX Constructions. 226-243 - Andrey Bogdanov, Gregor Leander

, Kaisa Nyberg
, Meiqin Wang:
Integral and Multidimensional Linear Distinguishers with Correlation Zero. 244-261 - Hongjun Wu

, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling
:
Differential Attacks against Stream Cipher ZUC. 262-277
Security Proof
- Rodolphe Lampe, Jacques Patarin, Yannick Seurin:

An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher. 278-295 - Liting Zhang, Wenling Wu, Han Sui, Peng Wang

:
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound. 296-312 - Dimitar Jetchev, Onur Özen, Martijn Stam:

Understanding Adaptivity: Random Systems Revisited. 313-330 - Mihir Bellare, Kenneth G. Paterson, Susan Thomson:

RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures. 331-348
Public-Key Cryptography II
- Tatsuaki Okamoto, Katsuyuki Takashima:

Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. 349-366 - Nuttapong Attrapadung, Benoît Libert, Thomas Peters:

Computing on Authenticated Data: New Privacy Definitions and Constructions. 367-385 - Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn:

A Coding-Theoretic Approach to Recovering Noisy RSA Keys. 386-403 - Saqib A. Kakvi

, Eike Kiltz
, Alexander May
:
Certifying RSA. 404-414
Lattice-Based Cryptography and Number Theory
- Léo Ducas, Phong Q. Nguyen:

Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic. 415-432 - Léo Ducas, Phong Q. Nguyen:

Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures. 433-450 - Christophe Petit

, Jean-Jacques Quisquater:
On Polynomial Systems Arising from a Weil Descent. 451-466
Public-Key Cryptography III
- Joppe W. Bos, Thorsten Kleinjung:

ECM at Work. 467-484 - Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento

:
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem. 485-503
Hash Function
- Jooyoung Lee:

Provable Security of the Knudsen-Preneel Compression Functions. 504-525 - Bart Mennink:

Optimal Collision Security in Double Block Length Hashing with Single Length Key. 526-543 - Dmitry Khovratovich:

Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings. 544-561 - Yu Sasaki, Lei Wang, Shuang Wu, Wenling Wu:

Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. 562-579 - Thomas Peyrin

, Yu Sasaki, Lei Wang:
Generic Related-Key Attacks for HMAC. 580-597
Cryptographic Protocol I
- Takaaki Mizuki

, Michihito Kumamoto, Hideaki Sone:
The Five-Card Trick Can Be Done with Four Cards. 598-606 - Shahram Khazaei

, Tal Moran, Douglas Wikström:
A Mix-Net from Any CCA2 Secure Cryptosystem. 607-625 - David Bernhard, Olivier Pereira, Bogdan Warinschi:

How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. 626-643
Cryptographic Protocol II
- Kyle Brogle, Sharon Goldberg, Leonid Reyzin:

Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract). 644-662 - Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes:

Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise. 663-680 - Gilad Asharov

, Claudio Orlandi
:
Calling Out Cheaters: Covert Security with Public Verifiability. 681-698 - Rafael Pass

, Huijia Lin, Muthuramakrishnan Venkitasubramaniam:
A Unified Framework for UC from Only OT. 699-717
Implementation Issues
- Patrick Longa, Francesco Sica

:
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. 718-739 - Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, François-Xavier Standaert

:
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. 740-757 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede

:
Theory and Practice of a Leakage Resilient Masking Scheme. 758-775

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














