default search action
ASIACRYPT 2018: Brisbane, QLD, Australia
- Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11273, Springer 2018, ISBN 978-3-030-03328-6
Symmetric-Key Cryptanalysis
- Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. 3-34 - Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier:
Cryptanalysis of MORUS. 35-64 - Ling Song, Jian Guo, Danping Shi, San Ling:
New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions. 65-95 - Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella:
On the Concrete Security of Goldreich's Pseudorandom Generator. 96-124
Public Key and Identity-Based Encryption
- Fuyuki Kitagawa, Keisuke Tanaka:
A Framework for Achieving KDM-CCA Secure Public-Key Encryption. 127-157 - Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He:
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism. 158-189 - Dennis Hofheinz, Dingding Jia, Jiaxin Pan:
Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks. 190-220 - Tibor Jager, Rafael Kurek:
Short Digital Signatures and ID-KEMs via Truncation Collision Resistance. 221-250
Asiacrypt 2018 Award Paper I
- Shuichi Katsumata, Shota Yamada, Takashi Yamakawa:
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. 253-282
Side-Channels
- Pierre Karpman, Daniel S. Roche:
New Instantiations of the CRYPTO 2017 Masking Schemes. 285-314 - Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. 315-342 - Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain:
Tight Private Circuits: Achieving Probing Security with the Least Refreshing. 343-372 - Alex Biryukov, Aleksei Udovenko:
Attacks and Countermeasures for White-box Designs. 373-402
Signatures
- Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys. 405-434 - Dan Boneh, Manu Drijvers, Gregory Neven:
Compact Multi-signatures for Smaller Blockchains. 435-464 - Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow:
Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption. 465-492 - Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka:
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions. 493-522
Asiacrypt 2018 Award Paper II
Leakage-Resilient Cryptography
- Dahmun Goudarzi, Antoine Joux, Matthieu Rivain:
How to Securely Compute with Noisy Leakage in Quasilinear Complexity. 547-574 - Yu Chen, Yuyu Wang, Hong-Sheng Zhou:
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation. 575-606
Functional/Inner Product/Predicate Encryption
- Junichi Tomida, Katsuyuki Takashima:
Unbounded Inner Product Functional Encryption from Bilinear Maps. 609-639 - Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption. 640-672 - Jie Chen, Junqing Gong, Hoeteck Wee:
Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding. 673-702 - Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Decentralized Multi-Client Functional Encryption for Inner Product. 703-732 - Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker:
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p. 733-764
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.