Conferences in DBLP
Kazumaro Aoki , Jens Franke , Thorsten Kleinjung , Arjen K. Lenstra , Dag Arne Osvik A Kilobit Special Number Field Sieve Factorization. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:1-12 [Conf ] Antoine Joux , David Naccache , Emmanuel Thomé When e -th Roots Become Easier Than Factoring. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:13-28 [Conf ] Daniel J. Bernstein , Tanja Lange Faster Addition and Doubling on Elliptic Curves. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:29-50 [Conf ] Jens Groth , Steve Lu A Non-interactive Shuffle with Pairing Based Verifiability. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:51-67 [Conf ] Serge Vaudenay On Privacy Models for RFID. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:68-87 [Conf ] Ran Canetti Obtaining Universally Compoable Security: Towards the Bare Bones of Trust. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:88-112 [Conf ] Shoichi Hirose , Je Hong Park , Aaram Yun A Simple Variant of the Merkle-Damgård Scheme with a Permutation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:113-129 [Conf ] Elena Andreeva , Gregory Neven , Bart Preneel , Thomas Shrimpton Seven-Property-Preserving Iterated Hashing: ROX. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:130-146 [Conf ] Thomas Ristenpart , Thomas Shrimpton How to Build a Hash Function from Any Collision-Resistant Function. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:147-163 [Conf ] Jens Groth Fully Anonymous Group Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:164-180 [Conf ] Aggelos Kiayias , Yiannis Tsiounis , Moti Yung Group Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:181-199 [Conf ] Cécile Delerablée Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:200-215 [Conf ] Kan Yasuda Boosting Merkle-Damgård Hashing for Message Authentication. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:216-231 [Conf ] Goce Jakimoski , K. P. Subbalakshmi On Efficient Message Authentication Via Block Cipher Design Techniques. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:232-248 [Conf ] Jason Yang , James Goodman Symmetric Key Cryptography on Modern Graphics Hardware. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:249-264 [Conf ] Matthew Green , Susan Hohenberger Blind Identity-Based Encryption and Simulatable Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:265-282 [Conf ] Matthew K. Franklin , Mark Gondree , Payman Mohassel Multi-party Indirect Indexing and Applications. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:283-297 [Conf ] Seung Geol Choi , Ariel Elbaz , Ari Juels , Tal Malkin , Moti Yung Two-Party Computing with Encrypted Data. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:298-314 [Conf ] Lars R. Knudsen , Vincent Rijmen Known-Key Distinguishers for Some Block Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:315-324 [Conf ] Jacques Patarin , Valérie Nachef , Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:325-341 [Conf ] David Goldenberg , Susan Hohenberger , Moses Liskov , Elizabeth Crump Schwartz , Hakan Seyalioglu On Tweaking Luby-Rackoff Blockciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:342-356 [Conf ] Ivan Damgård , Yvo Desmedt , Matthias Fitzi , Jesper Buus Nielsen Secure Protocols with Asymmetric Trust. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:357-375 [Conf ] Zuzana Beerliová-Trubíniová , Martin Hirt Simple and Efficient Perfectly-Secure Asynchronous MPC. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:376-392 [Conf ] Zuzana Beerliová-Trubíniová , Martin Hirt , Micha Riser Efficient Byzantine Agreement with Faulty Minority. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:393-409 [Conf ] Anne Broadbent , Alain Tapp Information-Theoretic Security Without an Honest Majority. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:410-426 [Conf ] Ueli M. Maurer , Dominik Raub Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:427-443 [Conf ] Vipul Goyal , Ryan Moriarty , Rafail Ostrovsky , Amit Sahai Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:444-459 [Conf ] Gilles Brassard , Anne Broadbent , Joseph Fitzsimons , Sébastien Gambs , Alain Tapp Anonymous Quantum Communication. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:460-473 [Conf ] Tatsuaki Okamoto Authenticated Key Exchange and Key Encapsulation in the Standard Model. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:474-484 [Conf ] Xavier Boyen Miniature CCA2 PK Encryption: Tight Security Without Redundancy. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:485-501 [Conf ] Ronald Cramer , Goichiro Hanaoka , Dennis Hofheinz , Hideki Imai , Eike Kiltz , Rafael Pass , Abhi Shelat , Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:502-518 [Conf ] Rafael Pass , Abhi Shelat , Vinod Vaikuntanathan Relations Among Notions of Non-malleability for Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:519-535 [Conf ] Florian Mendel , Vincent Rijmen Cryptanalysis of the Tiger Hash Function. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:536-550 [Conf ] Thomas Peyrin Cryptanalysis of Grindahl. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:551-567 [Conf ] Martin Hell , Thomas Johansson A Key Recovery Attack on Edon80. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:568-581 [Conf ]