


default search action
25th ASIACRYPT 2019: Kobe, Japan - Part III
- Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11923, Springer 2019, ISBN 978-3-030-34617-1
Signatures
- Yilei Chen, Nicholas Genise, Pratyay Mukherjee:
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures. 3-32 - Daniel J. Bernstein, Andreas Hülsing
:
Decisional Second-Preimage Resistance: When Does SPR Imply PRE? 33-62 - Mojtaba Khalili, Daniel Slamanig
, Mohammad Dakhilalian
:
Structure-Preserving Signatures on Equivalence Classes from Standard Assumptions. 63-93
Public Key Encryption (1)
- Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka:
Simple and Efficient KDM-CCA Secure Public Key Encryption. 97-127 - Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka:
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem. 128-158 - Antonio Faonio
, Dario Fiore, Javier Herranz
, Carla Ràfols
:
Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications. 159-190 - Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch:
iUC: Flexible Universal Composability Made Simple. 191-221
Side Channels
- Christoph Dobraunig
, Bart Mennink:
Leakage Resilience of the Duplex Construction. 225-255 - Carolyn Whitnall, Elisabeth Oswald:
A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules'). 256-284 - Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis
, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages. 285-314 - Stefan Dziembowski, Sebastian Faust, Karol Zebrowski:
Simple Refreshing in the Noisy Leakage Model. 315-344
Symmetric Cryptography (2)
- Navid Ghaedi Bardeh
, Sondre Rønjom:
The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts. 347-370 - Martin R. Albrecht, Carlos Cid, Lorenzo Grassi
, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC. 371-397 - Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
MILP-aided Method of Searching Division Property Using Three Subsets and Applications. 398-427 - Bin Zhang:
Cryptanalysis of GSM Encryption in 2G/3G Networks Without Rainbow Tables. 428-456
Functional Encryption
- Junichi Tomida:
Tightly Secure Inner Product Functional Encryption: Multi-input and Function-Hiding Constructions. 459-488 - James Bartusek
, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). 489-519 - Benoît Libert, Radu Titiu:
Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE. 520-551 - Michel Abdalla
, Fabrice Benhamouda
, Romain Gay
:
From Single-Input to Multi-client Inner-Product Functional Encryption. 552-582
Public Key Encryption (2)
- Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta
:
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem. 585-606 - Mihir Bellare, Wei Dai, Lucy Li:
The Local Forking Lemma and Its Application to Deterministic Encryption. 607-636 - Shohei Egashira, Yuyu Wang
, Keisuke Tanaka:
Fine-Grained Cryptography Revisited. 637-666
Zero Knowledge
- Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan
, Arnab Roy, Yuyu Wang
:
Shorter QA-NIZK and SPS with Tighter Security. 669-699 - Sharon Goldberg
, Leonid Reyzin
, Omar Sagga
, Foteini Baldimtsi
:
Efficient Noninteractive Certification of RSA Moduli and Beyond. 700-727 - Alonso González, Carla Ràfols
:
Shorter Pairing-Based Arguments Under Standard Assumptions. 728-757

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.