


default search action
25th ASIACRYPT 2019: Kobe, Japan - Part II
- Steven D. Galbraith, Shiho Moriai:

Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11922, Springer 2019, ISBN 978-3-030-34620-1
Codes
- Yu Yu, Jiang Zhang, Jian Weng

, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise. 3-24 - Khoa Nguyen

, Hanh Tang
, Huaxiong Wang, Neng Zeng:
New Code-Based Privacy-Preserving Cryptographic Constructions. 25-55
Lattices (2)
- Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet

:
An LLL Algorithm for Module Lattices. 59-90 - Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma:

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets. 91-120 - Ngoc Khanh Nguyen:

On the Non-existence of Short Vectors in Random Module Lattices. 121-150
Authenticated Encryption
- Elena Andreeva

, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy
, Damian Vizár:
Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages. 153-182 - John Chan, Phillip Rogaway:

Anonymous AE. 183-208 - Jean Paul Degabriele, Christian Janson, Patrick Struck

:
Sponges Resist Leakage: The Case of Authenticated Encryption. 209-240
Isogenies (2)
- Michael Naehrig, Joost Renes:

Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography. 243-272 - Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong:

Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves. 273-292 - Salim Ali Altug, Yilei Chen:

Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion. 293-322
Multilinear Maps
- Jean-Sébastien Coron, Hilder V. L. Pereira:

On Kilian's Randomization of Multilinear Map Encodings. 325-355 - Jean-Sébastien Coron, Luca Notarnicola:

Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. 356-385 - Michel Abdalla

, Fabrice Benhamouda
, Alain Passelègue:
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps. 386-412
Homomorphic Encryption
- Jung Hee Cheon, Dongwoo Kim

, Duhyeong Kim, Hun-Hee Lee, Keewoo Lee:
Numerical Method for Comparison on Homomorphically Encrypted Numbers. 415-445 - Hao Chen, Ilaria Chillotti

, Yongsoo Song
:
Multi-Key Homomorphic Encryption from TFHE. 446-472 - Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio

:
Homomorphic Encryption for Finite Automata. 473-502
Combinatorial Cryptography
- Qi Chen, Chunming Tang, Zhiqiang Lin:

Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. 505-536 - Michael A. Raskin

, Mark Simkin
:
Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead. 537-563 - Kaoru Kurosawa:

How to Correct Errors in Multi-server PIR. 564-574
Multiparty Computation (2)
- Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti:

UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens. 577-605 - Ignacio Cascudo

, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli:
Efficient UC Commitment Extension with Homomorphism for Free (and Applications). 606-635 - Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang

:
Scalable Private Set Union from Symmetric-Key Techniques. 636-666

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














