ASIACRYPT 2013: Bengaluru, India

Message Authentication Codes

Signatures

Cryptography Based Upon Physical Assumptions

Multi-Party Computation

Cryptographic Primitives

Analysis, Cryptanalysis and Passwords

Leakage-Resilient Cryptography

Two-Party Computation

Hash Functions

maintained by Schloss Dagstuhl LZI at University of Trier