Conferences in DBLP
Christophe De Cannière , Christian Rechberger Finding SHA-1 Characteristics: General Results and Applications. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:1-20 [Conf ] Yusuke Naito , Yu Sasaki , Takeshi Shimoyama , Jun Yajima , Noboru Kunihiro , Kazuo Ohta Improved Collision Search for SHA-0. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:21-36 [Conf ] Scott Contini , Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:37-53 [Conf ] Bin Zhang , Dengguo Feng New Guess-and-Determine Attack on the Self-Shrinking Generator. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:54-68 [Conf ] Souradyuti Paul , Bart Preneel On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:69-83 [Conf ] Na Li , Wen-Feng Qi Construction and Analysis of Boolean Functions of 2t +1 Variables with Maximum Algebraic Immunity. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:84-98 [Conf ] Qiming Li , Yagiz Sutcu , Nasir Memon Secure Sketch for Biometric Templates. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:99-113 [Conf ] Pierrick Gaudry , T. Houtmann , D. Kohel , Christophe Ritzenthaler , A. Weng The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:114-129 [Conf ] Roberto Maria Avanzi , Vassil Dimitrov , Christophe Doche , Francesco Sica Extending Scalar Multiplication Using Double Bases. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:130-144 [Conf ] Sanjit Chatterjee , Palash Sarkar HIBE With Short Public Parameters Without Random Oracle. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:145-160 [Conf ] Nuttapong Attrapadung , Jun Furukawa , Hideki Imai Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:161-177 [Conf ] David Galindo , Javier Herranz , Eike Kiltz On the Generic Construction of Identity-Based Signatures with Additional Properties. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:178-193 [Conf ] Ron Steinfeld , Josef Pieprzyk , Huaxiong Wang On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:194-209 [Conf ] Alexandra Boldyreva , Marc Fischlin On the Security of OAEP. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:210-225 [Conf ] Isamu Teranishi , Wakaha Ogata Relationship Between Standard Model Plaintext Awareness and Message Hiding. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:226-240 [Conf ] Gregor Leander , Andy Rupp On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:241-251 [Conf ] Pascal Paillier , Jorge Luis Villar Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:252-266 [Conf ] Ellen Jochemsz , Alexander May A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:267-282 [Conf ] Donghoon Chang , Sangjin Lee , Mridul Nandi , Moti Yung Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:283-298 [Conf ] Mihir Bellare , Thomas Ristenpart Multi-Property-Preserving Hash Domain Extension and the EMD Transform. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:299-314 [Conf ] Thomas Peyrin , Henri Gilbert , Frédéric Muller , Matthew J. B. Robshaw Combining Compression Functions and Block Cipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:315-331 [Conf ] Michel Abdalla , David Pointcheval A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:332-347 [Conf ] Ventzislav Nikov , Svetla Nikova , Bart Preneel A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:348-363 [Conf ] Satoshi Obana , Toshinori Araki Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:364-379 [Conf ] Thomas Baignères , Matthieu Finiasz KFC - The Krazy Feistel Cipher. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:380-395 [Conf ] Jacques Patarin , Valérie Nachef , Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:396-411 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller New Cryptanalytic Results on IDEA. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:412-427 [Conf ] Kaoru Kurosawa , Tsuyoshi Takagi New Approach for Selectively Convertible Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:428-443 [Conf ] Jens Groth Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:444-459 [Conf ] Zhengjun Cao Analysis of One Popular Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:460-466 [Conf ]