The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
2007 (conf/asiacrypt/2007)

  1. Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
    A Kilobit Special Number Field Sieve Factorization. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:1-12 [Conf]
  2. Antoine Joux, David Naccache, Emmanuel Thomé
    When e-th Roots Become Easier Than Factoring. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:13-28 [Conf]
  3. Daniel J. Bernstein, Tanja Lange
    Faster Addition and Doubling on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:29-50 [Conf]
  4. Jens Groth, Steve Lu
    A Non-interactive Shuffle with Pairing Based Verifiability. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:51-67 [Conf]
  5. Serge Vaudenay
    On Privacy Models for RFID. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:68-87 [Conf]
  6. Ran Canetti
    Obtaining Universally Compoable Security: Towards the Bare Bones of Trust. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:88-112 [Conf]
  7. Shoichi Hirose, Je Hong Park, Aaram Yun
    A Simple Variant of the Merkle-Damgård Scheme with a Permutation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:113-129 [Conf]
  8. Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
    Seven-Property-Preserving Iterated Hashing: ROX. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:130-146 [Conf]
  9. Thomas Ristenpart, Thomas Shrimpton
    How to Build a Hash Function from Any Collision-Resistant Function. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:147-163 [Conf]
  10. Jens Groth
    Fully Anonymous Group Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:164-180 [Conf]
  11. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
    Group Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:181-199 [Conf]
  12. Cécile Delerablée
    Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:200-215 [Conf]
  13. Kan Yasuda
    Boosting Merkle-Damgård Hashing for Message Authentication. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:216-231 [Conf]
  14. Goce Jakimoski, K. P. Subbalakshmi
    On Efficient Message Authentication Via Block Cipher Design Techniques. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:232-248 [Conf]
  15. Jason Yang, James Goodman
    Symmetric Key Cryptography on Modern Graphics Hardware. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:249-264 [Conf]
  16. Matthew Green, Susan Hohenberger
    Blind Identity-Based Encryption and Simulatable Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:265-282 [Conf]
  17. Matthew K. Franklin, Mark Gondree, Payman Mohassel
    Multi-party Indirect Indexing and Applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:283-297 [Conf]
  18. Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
    Two-Party Computing with Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:298-314 [Conf]
  19. Lars R. Knudsen, Vincent Rijmen
    Known-Key Distinguishers for Some Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:315-324 [Conf]
  20. Jacques Patarin, Valérie Nachef, Côme Berbain
    Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:325-341 [Conf]
  21. David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
    On Tweaking Luby-Rackoff Blockciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:342-356 [Conf]
  22. Ivan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen
    Secure Protocols with Asymmetric Trust. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:357-375 [Conf]
  23. Zuzana Beerliová-Trubíniová, Martin Hirt
    Simple and Efficient Perfectly-Secure Asynchronous MPC. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:376-392 [Conf]
  24. Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser
    Efficient Byzantine Agreement with Faulty Minority. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:393-409 [Conf]
  25. Anne Broadbent, Alain Tapp
    Information-Theoretic Security Without an Honest Majority. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:410-426 [Conf]
  26. Ueli M. Maurer, Dominik Raub
    Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:427-443 [Conf]
  27. Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
    Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:444-459 [Conf]
  28. Gilles Brassard, Anne Broadbent, Joseph Fitzsimons, Sébastien Gambs, Alain Tapp
    Anonymous Quantum Communication. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:460-473 [Conf]
  29. Tatsuaki Okamoto
    Authenticated Key Exchange and Key Encapsulation in the Standard Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:474-484 [Conf]
  30. Xavier Boyen
    Miniature CCA2 PK Encryption: Tight Security Without Redundancy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:485-501 [Conf]
  31. Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
    Bounded CCA2-Secure Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:502-518 [Conf]
  32. Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
    Relations Among Notions of Non-malleability for Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:519-535 [Conf]
  33. Florian Mendel, Vincent Rijmen
    Cryptanalysis of the Tiger Hash Function. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:536-550 [Conf]
  34. Thomas Peyrin
    Cryptanalysis of Grindahl. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:551-567 [Conf]
  35. Martin Hell, Thomas Johansson
    A Key Recovery Attack on Edon80. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:568-581 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002