


default search action
25th ASIACRYPT 2019: Kobe, Japan - Part III
- Steven D. Galbraith, Shiho Moriai:

Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11923, Springer 2019, ISBN 978-3-030-34617-1
Signatures
- Yilei Chen, Nicholas Genise, Pratyay Mukherjee:

Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures. 3-32 - Daniel J. Bernstein, Andreas Hülsing

:
Decisional Second-Preimage Resistance: When Does SPR Imply PRE? 33-62 - Mojtaba Khalili, Daniel Slamanig

, Mohammad Dakhilalian
:
Structure-Preserving Signatures on Equivalence Classes from Standard Assumptions. 63-93
Public Key Encryption (1)
- Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka:

Simple and Efficient KDM-CCA Secure Public Key Encryption. 97-127 - Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka:

Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem. 128-158 - Antonio Faonio

, Dario Fiore, Javier Herranz
, Carla Ràfols
:
Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications. 159-190 - Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch:

iUC: Flexible Universal Composability Made Simple. 191-221
Side Channels
- Christoph Dobraunig

, Bart Mennink:
Leakage Resilience of the Duplex Construction. 225-255 - Carolyn Whitnall, Elisabeth Oswald:

A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules'). 256-284 - Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis

, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages. 285-314 - Stefan Dziembowski, Sebastian Faust, Karol Zebrowski:

Simple Refreshing in the Noisy Leakage Model. 315-344
Symmetric Cryptography (2)
- Navid Ghaedi Bardeh

, Sondre Rønjom:
The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts. 347-370 - Martin R. Albrecht, Carlos Cid, Lorenzo Grassi

, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. 371-397 - Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:

MILP-aided Method of Searching Division Property Using Three Subsets and Applications. 398-427 - Bin Zhang:

Cryptanalysis of GSM Encryption in 2G/3G Networks Without Rainbow Tables. 428-456
Functional Encryption
- Junichi Tomida:

Tightly Secure Inner Product Functional Encryption: Multi-input and Function-Hiding Constructions. 459-488 - James Bartusek

, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). 489-519 - Benoît Libert, Radu Titiu:

Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE. 520-551 - Michel Abdalla

, Fabrice Benhamouda
, Romain Gay
:
From Single-Input to Multi-client Inner-Product Functional Encryption. 552-582
Public Key Encryption (2)
- Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta

:
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem. 585-606 - Mihir Bellare, Wei Dai, Lucy Li:

The Local Forking Lemma and Its Application to Deterministic Encryption. 607-636 - Shohei Egashira, Yuyu Wang

, Keisuke Tanaka:
Fine-Grained Cryptography Revisited. 637-666
Zero Knowledge
- Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan

, Arnab Roy, Yuyu Wang
:
Shorter QA-NIZK and SPS with Tighter Security. 669-699 - Sharon Goldberg

, Leonid Reyzin
, Omar Sagga
, Foteini Baldimtsi
:
Efficient Noninteractive Certification of RSA Moduli and Beyond. 700-727 - Alonso González, Carla Ràfols

:
Shorter Pairing-Based Arguments Under Standard Assumptions. 728-757

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














