default search action
ASIACRYPT 2013: Bengaluru, India
- Kazue Sako, Palash Sarkar:
Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I. Lecture Notes in Computer Science 8269, Springer 2013, ISBN 978-3-642-42032-0
Zero-Knowledge
- Charanjit S. Jutla, Arnab Roy:
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces. 1-20 - Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti:
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model. 21-40 - Helger Lipmaa:
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes. 41-60
Algebraic Cryptography
- Benjamin Smith:
Families of Fast Elliptic Curves from ℚ-curves. 61-78 - Aurore Guillevic, Sorina Ionica:
Four-Dimensional GLV via the Weil Restriction. 79-96 - Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:
Discrete Gaussian Leftover Hash Lemma over Infinite Domains. 97-116 - Gilles Macario-Rat, Jérôme Plût, Henri Gilbert:
New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography. 117-133
Theoretical Cryptography-I
- Sandro Coretti, Ueli Maurer, Björn Tackmann:
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited. 134-153 - Paul Baecher, Christina Brzuska, Arno Mittelbach:
Reset Indifferentiability and Its Consequences. 154-173 - Benjamin Fuller, Xianrui Meng, Leonid Reyzin:
Computational Fuzzy Extractors. 174-193 - Joseph M. Renes, Renato Renner, David Sutter:
Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization. 194-213
Protocols
- Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval:
SPHF-Friendly Non-interactive Commitments. 214-234 - Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency. 235-254 - Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Subspace-Membership Encryption and Its Applications. 255-275 - Jalaj Upadhyay:
Random Projections, Graph Sparsification, and Differential Privacy. 276-295
Theoretical Cryptography-II
- Paul Baecher, Christina Brzuska, Marc Fischlin:
Notions of Black-Box Reductions, Revisited. 296-315 - Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam:
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments. 316-336
Symmetric Key Cryptanalysis
- Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. 337-356 - Andrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin Wang, Long Wen, Jingyuan Zhao:
Key Difference Invariant Bias in Block Ciphers. 357-376 - Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE. 377-404
Symmetric Key Cryptology: Schemes and Analysis
- Thomas Shrimpton, R. Seth Terashima:
A Modular Framework for Building Variable-Input-Length Tweakable Ciphers. 405-423 - Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda:
Parallelizable and Authenticated Online Ciphers. 424-443 - Rodolphe Lampe, Yannick Seurin:
How to Construct an Ideal Cipher from a Small Set of Public Permutations. 444-463 - Takanori Isobe, Kyoji Shibutani:
Generic Key Recovery Attack on Feistel Scheme. 464-485
Side-Channel Cryptanalysis
- Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wójcik:
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests. 486-505 - Victor Lomné, Emmanuel Prouff, Thomas Roche:
Behind the Scene of Side Channel Attacks. 506-525 - Matthieu Rivain, Thomas Roche:
SCARE of Secret Ciphers with SPN Structures. 526-544
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.