default search action
Search dblp for Publications
export results for "stream:conf/asiapkc:"
@inproceedings{DBLP:conf/asiapkc/FujitaY24, author = {Kazuhiro Fujita and Kazuki Yoneyama}, editor = {Keisuke Hara and Daiki Miyahara}, title = {Formal Verification of Wireless Charging Standard Qi}, booktitle = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3659467.3659904}, doi = {10.1145/3659467.3659904}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/FujitaY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/IkematsuA24, author = {Yasuhiko Ikematsu and Rika Akiyama}, editor = {Keisuke Hara and Daiki Miyahara}, title = {Revisiting the security analysis of {SNOVA}}, booktitle = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3659467.3659900}, doi = {10.1145/3659467.3659900}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/IkematsuA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/MatsuuraHY24, author = {Takumi Matsuura and Keisuke Hara and Kyosuke Yamashita}, editor = {Keisuke Hara and Daiki Miyahara}, title = {Designated Verifier Signature with Repudiability}, booktitle = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3659467.3659901}, doi = {10.1145/3659467.3659901}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/MatsuuraHY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/MitaY24, author = {Takumu Mita and Kazuki Yoneyama}, editor = {Keisuke Hara and Daiki Miyahara}, title = {Tightly Secure ID-based Authenticated Key Exchange}, booktitle = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3659467.3659903}, doi = {10.1145/3659467.3659903}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/MitaY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/TakahashiSSM24, author = {Yoshihiro Takahashi and Kazumasa Shinagawa and Hayato Shikata and Takaaki Mizuki}, editor = {Keisuke Hara and Daiki Miyahara}, title = {Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored Decks}, booktitle = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3659467.3659902}, doi = {10.1145/3659467.3659902}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/TakahashiSSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/TamuraSM24, author = {Yuma Tamura and Akira Suzuki and Takaaki Mizuki}, editor = {Keisuke Hara and Daiki Miyahara}, title = {Card-Based Zero-Knowledge Proof Protocols for the 15-Puzzle and the Token Swapping Problem}, booktitle = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3659467.3659905}, doi = {10.1145/3659467.3659905}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/TamuraSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiapkc/2024, editor = {Keisuke Hara and Daiki Miyahara}, title = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3659467}, doi = {10.1145/3659467}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/DubrovaNGW23, author = {Elena Dubrova and Kalle Ngo and Joel G{\"{a}}rtner and Ruize Wang}, editor = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste}, booktitle = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {10--20}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591866.3593072}, doi = {10.1145/3591866.3593072}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/DubrovaNGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/ShahN0D23, author = {Syed Wajid Ali Shah and Mohammad Reza Nosouhi and Lei Pan and Robin Doss}, editor = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {SoK: On Efficacy of the {BGF} Decoder for QC-MDPC-based Quantum-Safe Cryptosystems}, booktitle = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {2--9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591866.3593070}, doi = {10.1145/3591866.3593070}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/ShahN0D23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/ShikataMM23, author = {Hayato Shikata and Daiki Miyahara and Takaaki Mizuki}, editor = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges}, booktitle = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {33--41}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591866.3593073}, doi = {10.1145/3591866.3593073}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/ShikataMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/Steinfeld23, author = {Ron Steinfeld}, editor = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {Post-Quantum Zero-Knowledge Proofs and Applications}, booktitle = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {1}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591866.3593075}, doi = {10.1145/3591866.3593075}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/Steinfeld23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/YamashitaH0YS23, author = {Kyosuke Yamashita and Keisuke Hara and Yohei Watanabe and Naoto Yanai and Junji Shikata}, editor = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {Designated Verifier Signature with Claimability}, booktitle = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {21--32}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591866.3593071}, doi = {10.1145/3591866.3593071}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/YamashitaH0YS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiapkc/2023, editor = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop, {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591866}, doi = {10.1145/3591866}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/Emura22, author = {Keita Emura}, editor = {Jason Paul Cruz and Naoto Yanai}, title = {Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction}, booktitle = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022}, pages = {39--49}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494105.3526237}, doi = {10.1145/3494105.3526237}, timestamp = {Wed, 25 May 2022 09:49:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/Emura22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/KelkarDK22, author = {Mahimna Kelkar and Soubhik Deb and Sreeram Kannan}, editor = {Jason Paul Cruz and Naoto Yanai}, title = {Order-Fair Consensus in the Permissionless Setting}, booktitle = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022}, pages = {3--14}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494105.3526239}, doi = {10.1145/3494105.3526239}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/KelkarDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/KuzumaITMM22, author = {Tomoki Kuzuma and Raimu Isuzugawa and Kodai Toyoda and Daiki Miyahara and Takaaki Mizuki}, editor = {Jason Paul Cruz and Naoto Yanai}, title = {Card-based Single-shuffle Protocols for Secure Multiple-input {AND} and {XOR} Computations}, booktitle = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022}, pages = {51--58}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494105.3526236}, doi = {10.1145/3494105.3526236}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/KuzumaITMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/Nuida22, author = {Koji Nuida}, editor = {Jason Paul Cruz and Naoto Yanai}, title = {How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption}, booktitle = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022}, pages = {15--25}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494105.3526238}, doi = {10.1145/3494105.3526238}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/Nuida22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/Vanhoef22, author = {Mathy Vanhoef}, editor = {Jason Paul Cruz and Naoto Yanai}, title = {A Time-Memory Trade-Off Attack on WPA3's {SAE-PK}}, booktitle = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022}, pages = {27--37}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494105.3526235}, doi = {10.1145/3494105.3526235}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiapkc/Vanhoef22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiapkc/YouA22, author = {Ilsun You and Philip Virgil Astillo}, editor = {Jason Paul Cruz and Naoto Yanai}, title = {IIMB-Lite: Lightweight Misbehavior Detection Approach for Insulin Infusion System}, booktitle = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022}, pages = {1--2}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494105.3530252}, doi = {10.1145/3494105.3530252}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/YouA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiapkc/2022, editor = {Jason Paul Cruz and Naoto Yanai}, title = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494105}, doi = {10.1145/3494105}, isbn = {978-1-4503-9174-0}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiapkc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DAnversOV21, author = {Jan{-}Pieter D'Anvers and Emmanuela Orsini and Frederik Vercauteren}, editor = {Keita Emura and Yuntao Wang}, title = {Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {3--12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458295}, doi = {10.1145/3457338.3458295}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DAnversOV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EbinaMSW21, author = {Masahiro Ebina and Jumpei Mita and Junji Shikata and Yohei Watanabe}, editor = {Keita Emura and Yuntao Wang}, title = {Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {23--32}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458296}, doi = {10.1145/3457338.3458296}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EbinaMSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Espitau21, author = {Thomas Espitau}, editor = {Keita Emura and Yuntao Wang}, title = {Mitaka: Faster, Simpler, Parallelizable and Maskable Hash-and-Sign Signatures on {NTRU} Lattices}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {1}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458293}, doi = {10.1145/3457338.3458293}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Espitau21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaraMT21, author = {Keisuke Hara and Takahiro Matsuda and Keisuke Tanaka}, editor = {Keita Emura and Yuntao Wang}, title = {Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {51--59}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458294}, doi = {10.1145/3457338.3458294}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HaraMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KoyamaTMM21, author = {Hiroto Koyama and Kodai Toyoda and Daiki Miyahara and Takaaki Mizuki}, editor = {Keita Emura and Yuntao Wang}, title = {New Card-based Copy Protocols Using Only Random Cuts}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {13--22}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458297}, doi = {10.1145/3457338.3458297}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KoyamaTMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Peng21, author = {Kun Peng}, editor = {Keita Emura and Yuntao Wang}, title = {Perfect {ZK} Argument of Knowledge of Discrete Logarithm in {A} Cyclic Group with Unknown Order}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {33--40}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458287}, doi = {10.1145/3457338.3458287}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Peng21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShibataY21, author = {Toshiya Shibata and Kazuki Yoneyama}, editor = {Keita Emura and Yuntao Wang}, title = {Universally Composable Forward Secure Dynamic Searchable Symmetric Encryption}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {41--50}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458290}, doi = {10.1145/3457338.3458290}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShibataY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2021asiapkc, editor = {Keita Emura and Yuntao Wang}, title = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338}, doi = {10.1145/3457338}, isbn = {978-1-4503-8401-8}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2021asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IkematsuFKYTY20, author = {Yasuhiko Ikematsu and Ryoya Fukasaku and Momonari Kudo and Masaya Yasuda and Katsuyuki Takashima and Kazuhiro Yokoyama}, editor = {Keita Emura and Naoto Yanai}, title = {Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem}, booktitle = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {36--44}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940.3388956}, doi = {10.1145/3384940.3388956}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IkematsuFKYTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NakanishiYMP20, author = {Toru Nakanishi and Hiromi Yoshino and Tomoki Murakami and Guru{-}Vamsi Policharla}, editor = {Keita Emura and Naoto Yanai}, title = {Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator}, booktitle = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {9--18}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940.3388959}, doi = {10.1145/3384940.3388959}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NakanishiYMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NoguchiHY20, author = {Ryoga Noguchi and Yoshikazu Hanatani and Kazuki Yoneyama}, editor = {Keita Emura and Naoto Yanai}, title = {Verification of Group Key Management of {IEEE} 802.21 using ProVerif}, booktitle = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {19--27}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940.3388960}, doi = {10.1145/3384940.3388960}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NoguchiHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TiepeltD20, author = {Marcel Tiepelt and Jan{-}Pieter D'Anvers}, editor = {Keita Emura and Naoto Yanai}, title = {Exploiting Decryption Failures in Mersenne Number Cryptosystems}, booktitle = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {45--54}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940.3388957}, doi = {10.1145/3384940.3388957}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TiepeltD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ToyodaMMS20, author = {Kodai Toyoda and Daiki Miyahara and Takaaki Mizuki and Hideaki Sone}, editor = {Keita Emura and Naoto Yanai}, title = {Six-Card Finite-Runtime {XOR} Protocol with Only Random Cut}, booktitle = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {2--8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940.3388961}, doi = {10.1145/3384940.3388961}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ToyodaMMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wang20, author = {Peter Shaojui Wang}, editor = {Keita Emura and Naoto Yanai}, title = {Insider Collusion Attack on Distributed Machine Learning System and its Solutions - {A} Case of {SVM}}, booktitle = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {1}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940.3390638}, doi = {10.1145/3384940.3390638}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangIAT20, author = {Yuntao Wang and Yasuhiko Ikematsu and Koichiro Akiyama and Tsuyoshi Takagi}, editor = {Keita Emura and Naoto Yanai}, title = {Cryptanalysis of GiophantusTM Schemes against Hybrid Attack}, booktitle = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {28--35}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940.3388958}, doi = {10.1145/3384940.3388958}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangIAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020asiapkc, editor = {Keita Emura and Naoto Yanai}, title = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940}, doi = {10.1145/3384940}, isbn = {978-1-4503-7607-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Abdouli0CMM19, author = {Ameera Salem Al Abdouli and Emanuele Bellini and Florian Caullery and Marcos Manzano and V{\'{\i}}ctor Mateu}, editor = {Keita Emura and Takaaki Mizuki}, title = {Rank-metric Encryption on Arm-Cortex {M0:} Porting code-based cryptography to lightweight devices}, booktitle = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019}, pages = {23--30}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327958.3329544}, doi = {10.1145/3327958.3329544}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Abdouli0CMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Emura19, author = {Keita Emura}, editor = {Keita Emura and Takaaki Mizuki}, title = {Session details: Invited Talk}, booktitle = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3344278}, doi = {10.1145/3344278}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Emura19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FukumitsuH19, author = {Masayuki Fukumitsu and Shingo Hasegawa}, editor = {Keita Emura and Takaaki Mizuki}, title = {A Tightly-Secure Lattice-Based Multisignature}, booktitle = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019}, pages = {3--11}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327958.3329542}, doi = {10.1145/3327958.3329542}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FukumitsuH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MatsudaTK19, author = {Yoshitatsu Matsuda and Tadanori Teruya and Kenji Kashiwabara}, editor = {Keita Emura and Takaaki Mizuki}, title = {Efficient Estimation of Number of Short Lattice Vectors in Search Space under Randomness Assumption}, booktitle = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019}, pages = {13--22}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327958.3329543}, doi = {10.1145/3327958.3329543}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MatsudaTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Mizuki19, author = {Takaaki Mizuki}, editor = {Keita Emura and Takaaki Mizuki}, title = {Session details: Session 1}, booktitle = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3344279}, doi = {10.1145/3344279}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Mizuki19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Sakai19, author = {Yusuke Sakai}, editor = {Keita Emura and Takaaki Mizuki}, title = {Recent Advances in Attribute-Based Signatures}, booktitle = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019}, pages = {1}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327958.3329545}, doi = {10.1145/3327958.3329545}, timestamp = {Thu, 18 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Sakai19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019asiapkc, editor = {Keita Emura and Takaaki Mizuki}, title = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327958}, doi = {10.1145/3327958}, isbn = {978-1-4503-6784-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2019asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbeHMS18, author = {Yuta Abe and Yu{-}ichi Hayashi and Takaaki Mizuki and Hideaki Sone}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {Five-Card {AND} Protocol in Committed Format Using Only Practical Shuffles}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {3--8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197510}, doi = {10.1145/3197507.3197510}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbeHMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BelliniCHMM18, author = {Emanuele Bellini and Florian Caullery and Alexandros Hasikos and Marc Manzano and V{\'{\i}}ctor Mateu}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {You Shall Not Pass! (Once Again): An IoT Application of Post-quantum Stateful Signature Schemes}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {19--24}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197512}, doi = {10.1145/3197507.3197512}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BelliniCHMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Faz-HernandezLO18, author = {Armando Faz{-}Hern{\'{a}}ndez and Julio L{\'{o}}pez and Ana Karina D. S. de Oliveira}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {SoK: {A} Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {9--18}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197511}, doi = {10.1145/3197507.3197511}, timestamp = {Wed, 25 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Faz-HernandezLO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimGKL18, author = {Jon{-}Lark Kim and Lucky Galvez and Young{-}Sik Kim and Nari Lee}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {A New LRPC-Kronecker Product Codes Based Public-Key Cryptography}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {25--33}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197513}, doi = {10.1145/3197507.3197513}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KimGKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Lauer18, author = {Sebastian Lauer}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {On Several Verifiable Random Functions and the q-decisional Bilinear Diffie-Hellman Inversion Assumption}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {45--51}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197515}, doi = {10.1145/3197507.3197515}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Lauer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Teruya18, author = {Tadanori Teruya}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {A Note on Subgroup Security in Pairing-Based Cryptography}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {35--43}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197514}, doi = {10.1145/3197507.3197514}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Teruya18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UrbanikJ18, author = {David Urbanik and David Jao}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {SoK: The Problem Landscape of {SIDH}}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {53--60}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197516}, doi = {10.1145/3197507.3197516}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/UrbanikJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Yamakawa18, author = {Takashi Yamakawa}, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {Towards Ideal Self-bilinear Map}, booktitle = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, pages = {1}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507.3197508}, doi = {10.1145/3197507.3197508}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Yamakawa18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2018asiapkc, editor = {Keita Emura and Jae Hong Seo and Yohei Watanabe}, title = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3197507}, doi = {10.1145/3197507}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2018asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HanzlikK17, author = {Lucjan Hanzlik and Kamil Kluczniak}, editor = {Joonsang Baek and Rui Zhang}, title = {Two-Move and Setup-Free Blind Signatures with Perfect Blindness}, booktitle = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {1--11}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055504.3055505}, doi = {10.1145/3055504.3055505}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HanzlikK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeLLJJ17, author = {Jingnan He and Bao Li and Xianhui Lu and Dingding Jia and Wenpan Jing}, editor = {Joonsang Baek and Rui Zhang}, title = {{KDM} and Selective Opening Secure {IBE} Based on the {LWE} Problem}, booktitle = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {31--42}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055504.3055508}, doi = {10.1145/3055504.3055508}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HeLLJJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KitamuraSNO17, author = {Takuya Kitamura and Kazumasa Shinagawa and Takashi Nishide and Eiji Okamoto}, editor = {Joonsang Baek and Rui Zhang}, title = {One-time Programs with Cloud Storage and Its Application to Electronic Money}, booktitle = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {25--30}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055504.3055507}, doi = {10.1145/3055504.3055507}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KitamuraSNO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SlowikW17, author = {Marcin Slowik and Marta Wszola}, editor = {Joonsang Baek and Rui Zhang}, title = {An Efficient Verification of {CL-LRSW} Signatures and a Pseudonym Certificate System}, booktitle = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {13--23}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055504.3055506}, doi = {10.1145/3055504.3055506}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SlowikW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TanZMT17, author = {Gaosheng Tan and Rui Zhang and Hui Ma and Yang Tao}, editor = {Joonsang Baek and Rui Zhang}, title = {Access Control Encryption Based on {LWE}}, booktitle = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {43--50}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055504.3055509}, doi = {10.1145/3055504.3055509}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TanZMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017asiapkc, editor = {Joonsang Baek and Rui Zhang}, title = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055504}, doi = {10.1145/3055504}, isbn = {978-1-4503-4973-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2017asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0003RM16, author = {Poulami Das and Debapriya Basu Roy and Debdeep Mukhopadhyay}, editor = {Keita Emura and Goichiro Hanaoka and Rui Zhang}, title = {Improved Atomicity to Prevent {HCCA} on {NIST} Curves}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016}, pages = {21--30}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898420.2901921}, doi = {10.1145/2898420.2901921}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0003RM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AzarderakhshJKK16, author = {Reza Azarderakhsh and David Jao and Kassem Kalach and Brian Koziel and Christopher Leonardi}, editor = {Keita Emura and Goichiro Hanaoka and Rui Zhang}, title = {Key Compression for Isogeny-Based Cryptosystems}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016}, pages = {1--10}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898420.2898421}, doi = {10.1145/2898420.2898421}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AzarderakhshJKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BuchmannBG0KMSV16, author = {Johannes Buchmann and Niklas B{\"{u}}scher and Florian G{\"{o}}pfert and Stefan Katzenbeisser and Juliane Kr{\"{a}}mer and Daniele Micciancio and Sander Siim and Christine van Vredendaal and Michael Walter}, editor = {Keita Emura and Goichiro Hanaoka and Rui Zhang}, title = {Creating Cryptographic Challenges Using Multi-Party Computation: The {LWE} Challenge}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016}, pages = {11--20}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898420.2898422}, doi = {10.1145/2898420.2898422}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BuchmannBG0KMSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KieferM16, author = {Franziskus Kiefer and Mark Manulis}, editor = {Keita Emura and Goichiro Hanaoka and Rui Zhang}, title = {Blind Password Registration for Verifier-based {PAKE}}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016}, pages = {39--48}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898420.2898424}, doi = {10.1145/2898420.2898424}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KieferM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuB16, author = {Jiayang Liu and Jingguo Bi}, editor = {Keita Emura and Goichiro Hanaoka and Rui Zhang}, title = {Cryptanalysis of a Fast Private Information Retrieval Protocol}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016}, pages = {56--60}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898420.2898427}, doi = {10.1145/2898420.2898427}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NishimuraHMS16, author = {Akihiro Nishimura and Yu{-}ichi Hayashi and Takaaki Mizuki and Hideaki Sone}, editor = {Keita Emura and Goichiro Hanaoka and Rui Zhang}, title = {An Implementation of Non-Uniform Shuffle for Secure Multi-Party Computation}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016}, pages = {49--55}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898420.2898425}, doi = {10.1145/2898420.2898425}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NishimuraHMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Santoso16, author = {Bagus Santoso}, editor = {Keita Emura and Goichiro Hanaoka and Rui Zhang}, title = {Refining Identification Scheme based on Isomorphism of Polynomials with Two Secrets: a New Theoretical and Practical Analysis}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016}, pages = {31--38}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898420.2898423}, doi = {10.1145/2898420.2898423}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Santoso16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016asiapkc, editor = {Keita Emura and Goichiro Hanaoka and Rui Zhang}, title = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898420}, doi = {10.1145/2898420}, isbn = {978-1-4503-4286-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AnadaAS14, author = {Hiroaki Anada and Seiko Arita and Kouichi Sakurai}, editor = {Keita Emura and Goichiro Hanaoka and Yunlei Zhao}, title = {Attribute-based signatures without pairings via the fiat-shamir paradigm}, booktitle = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key Cryptography, June 3, 2014, Kyoto, Japan}, pages = {49--58}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600694.2600696}, doi = {10.1145/2600694.2600696}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AnadaAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AritaH14, author = {Seiko Arita and Sari Handa}, editor = {Keita Emura and Goichiro Hanaoka and Yunlei Zhao}, title = {Two applications of multilinear maps: group key exchange and witness encryption}, booktitle = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key Cryptography, June 3, 2014, Kyoto, Japan}, pages = {13--22}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600694.2600699}, doi = {10.1145/2600694.2600699}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AritaH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CabarcasGW14, author = {Daniel Cabarcas and Florian G{\"{o}}pfert and Patrick Weiden}, editor = {Keita Emura and Goichiro Hanaoka and Yunlei Zhao}, title = {Provably secure {LWE} encryption with smallish uniform noise and secret}, booktitle = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key Cryptography, June 3, 2014, Kyoto, Japan}, pages = {33--42}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600694.2600695}, doi = {10.1145/2600694.2600695}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CabarcasGW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OharaSYIO14, author = {Kazuma Ohara and Yusuke Sakai and Fumiaki Yoshida and Mitsugu Iwamoto and Kazuo Ohta}, editor = {Keita Emura and Goichiro Hanaoka and Yunlei Zhao}, title = {Privacy-preserving smart metering with verifiability for both billing and energy management}, booktitle = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key Cryptography, June 3, 2014, Kyoto, Japan}, pages = {23--32}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600694.2600700}, doi = {10.1145/2600694.2600700}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/OharaSYIO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Ohkubo14, author = {Miyako Ohkubo}, editor = {Keita Emura and Goichiro Hanaoka and Yunlei Zhao}, title = {Introduction of structure-preserving signatures}, booktitle = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key Cryptography, June 3, 2014, Kyoto, Japan}, pages = {1--2}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600694.2600701}, doi = {10.1145/2600694.2600701}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Ohkubo14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangS14, author = {Liang Feng Zhang and Reihaneh Safavi{-}Naini}, editor = {Keita Emura and Goichiro Hanaoka and Yunlei Zhao}, title = {Generalized homomorphic MACs with efficient verification}, booktitle = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key Cryptography, June 3, 2014, Kyoto, Japan}, pages = {3--12}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600694.2600697}, doi = {10.1145/2600694.2600697}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangT14, author = {Wenbin Zhang and Chik How Tan}, editor = {Keita Emura and Goichiro Hanaoka and Yunlei Zhao}, title = {A new perturbed matsumoto-imai signature scheme}, booktitle = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key Cryptography, June 3, 2014, Kyoto, Japan}, pages = {43--48}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600694.2600698}, doi = {10.1145/2600694.2600698}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014asiapkc, editor = {Keita Emura and Goichiro Hanaoka and Yunlei Zhao}, title = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key Cryptography, June 3, 2014, Kyoto, Japan}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2600694}, isbn = {978-1-4503-2801-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChuGLMZ13, author = {Dalin Chu and Johann Gro{\ss}sch{\"{a}}dl and Zhe Liu and Volker M{\"{u}}ller and Yang Zhang}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {39--44}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484398}, doi = {10.1145/2484389.2484398}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChuGLMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Hanaoka13, author = {Goichiro Hanaoka}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {On the properties of public key encryption from group signatures}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484391}, doi = {10.1145/2484389.2484391}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Hanaoka13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KitaharaYNS13, author = {Motoki Kitahara and Takanori Yasuda and Takashi Nishide and Kouichi Sakurai}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Upper bound of the length of information embedd in {RSA} public key efficiently}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {33--38}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484396}, doi = {10.1145/2484389.2484396}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KitaharaYNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaZY13, author = {Di Ma and Yan Zhu and Mengyang Yu}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {End-to-end aggregate authentication of time-series data}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {51--56}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484400}, doi = {10.1145/2484389.2484400}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PurushothamaA13, author = {B. R. Purushothama and B. B. Amberker}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Secure group key management scheme based on dual receiver cryptosystem}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {45--50}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484399}, doi = {10.1145/2484389.2484399}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PurushothamaA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QinLCC13, author = {Baodong Qin and Shengli Liu and Kefei Chen and Manuel Charlemagne}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Leakage-resilient lossy trapdoor functions and public-key encryption}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {3--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484393}, doi = {10.1145/2484389.2484393}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/QinLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiongYZYH13, author = {Hao Xiong and Tsz Hon Yuen and Cong Zhang and Siu{-}Ming Yiu and Yi Jun He}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Leakage-resilient certificateless public key encryption}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {13--22}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484394}, doi = {10.1145/2484389.2484394}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XiongYZYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YamakawaY0HK13, author = {Takashi Yamakawa and Shota Yamada and Takahiro Matsuda and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for {CCA} secure key encapsulation mechanism}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {23--32}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484395}, doi = {10.1145/2484389.2484395}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YamakawaY0HK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YasudaDTS13, author = {Takanori Yasuda and Jintai Ding and Tsuyoshi Takagi and Kouichi Sakurai}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {A variant of rainbow with shorter secret key and faster signature generation}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {57--62}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484401}, doi = {10.1145/2484389.2484401}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YasudaDTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013asiapkc, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2484389}, isbn = {978-1-4503-2069-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013asiapkc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.