Search dblp for Publications

export results for "stream:conf/asiapkc:"

 download as .bib file

@inproceedings{DBLP:conf/asiapkc/FujitaY24,
  author       = {Kazuhiro Fujita and
                  Kazuki Yoneyama},
  editor       = {Keisuke Hara and
                  Daiki Miyahara},
  title        = {Formal Verification of Wireless Charging Standard Qi},
  booktitle    = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3659467.3659904},
  doi          = {10.1145/3659467.3659904},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/FujitaY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/IkematsuA24,
  author       = {Yasuhiko Ikematsu and
                  Rika Akiyama},
  editor       = {Keisuke Hara and
                  Daiki Miyahara},
  title        = {Revisiting the security analysis of {SNOVA}},
  booktitle    = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3659467.3659900},
  doi          = {10.1145/3659467.3659900},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/IkematsuA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/MatsuuraHY24,
  author       = {Takumi Matsuura and
                  Keisuke Hara and
                  Kyosuke Yamashita},
  editor       = {Keisuke Hara and
                  Daiki Miyahara},
  title        = {Designated Verifier Signature with Repudiability},
  booktitle    = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3659467.3659901},
  doi          = {10.1145/3659467.3659901},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/MatsuuraHY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/MitaY24,
  author       = {Takumu Mita and
                  Kazuki Yoneyama},
  editor       = {Keisuke Hara and
                  Daiki Miyahara},
  title        = {Tightly Secure ID-based Authenticated Key Exchange},
  booktitle    = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3659467.3659903},
  doi          = {10.1145/3659467.3659903},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/MitaY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/TakahashiSSM24,
  author       = {Yoshihiro Takahashi and
                  Kazumasa Shinagawa and
                  Hayato Shikata and
                  Takaaki Mizuki},
  editor       = {Keisuke Hara and
                  Daiki Miyahara},
  title        = {Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored
                  Decks},
  booktitle    = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3659467.3659902},
  doi          = {10.1145/3659467.3659902},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/TakahashiSSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/TamuraSM24,
  author       = {Yuma Tamura and
                  Akira Suzuki and
                  Takaaki Mizuki},
  editor       = {Keisuke Hara and
                  Daiki Miyahara},
  title        = {Card-Based Zero-Knowledge Proof Protocols for the 15-Puzzle and the
                  Token Swapping Problem},
  booktitle    = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3659467.3659905},
  doi          = {10.1145/3659467.3659905},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/TamuraSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiapkc/2024,
  editor       = {Keisuke Hara and
                  Daiki Miyahara},
  title        = {Proceedings of the 11th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3659467},
  doi          = {10.1145/3659467},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/DubrovaNGW23,
  author       = {Elena Dubrova and
                  Kalle Ngo and
                  Joel G{\"{a}}rtner and
                  Ruize Wang},
  editor       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  title        = {Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by
                  Copy-Paste},
  booktitle    = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023},
  pages        = {10--20},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591866.3593072},
  doi          = {10.1145/3591866.3593072},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/DubrovaNGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/ShahN0D23,
  author       = {Syed Wajid Ali Shah and
                  Mohammad Reza Nosouhi and
                  Lei Pan and
                  Robin Doss},
  editor       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  title        = {SoK: On Efficacy of the {BGF} Decoder for QC-MDPC-based Quantum-Safe
                  Cryptosystems},
  booktitle    = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023},
  pages        = {2--9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591866.3593070},
  doi          = {10.1145/3591866.3593070},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/ShahN0D23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/ShikataMM23,
  author       = {Hayato Shikata and
                  Daiki Miyahara and
                  Takaaki Mizuki},
  editor       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  title        = {Few-helping-card Protocols for Some Wider Class of Symmetric Boolean
                  Functions with Arbitrary Ranges},
  booktitle    = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023},
  pages        = {33--41},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591866.3593073},
  doi          = {10.1145/3591866.3593073},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/ShikataMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/Steinfeld23,
  author       = {Ron Steinfeld},
  editor       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  title        = {Post-Quantum Zero-Knowledge Proofs and Applications},
  booktitle    = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591866.3593075},
  doi          = {10.1145/3591866.3593075},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/Steinfeld23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/YamashitaH0YS23,
  author       = {Kyosuke Yamashita and
                  Keisuke Hara and
                  Yohei Watanabe and
                  Naoto Yanai and
                  Junji Shikata},
  editor       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  title        = {Designated Verifier Signature with Claimability},
  booktitle    = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591866.3593071},
  doi          = {10.1145/3591866.3593071},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/YamashitaH0YS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiapkc/2023,
  editor       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  title        = {Proceedings of the 10th {ACM} Asia Public-Key Cryptography Workshop,
                  {APKC} 2023, Melbourne, VIC, Australia, July 10-14, 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591866},
  doi          = {10.1145/3591866},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/Emura22,
  author       = {Keita Emura},
  editor       = {Jason Paul Cruz and
                  Naoto Yanai},
  title        = {Generic Construction of Public-key Authenticated Encryption with Keyword
                  Search Revisited: Stronger Security and Efficient Construction},
  booktitle    = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography
                  Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  pages        = {39--49},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494105.3526237},
  doi          = {10.1145/3494105.3526237},
  timestamp    = {Wed, 25 May 2022 09:49:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/Emura22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/KelkarDK22,
  author       = {Mahimna Kelkar and
                  Soubhik Deb and
                  Sreeram Kannan},
  editor       = {Jason Paul Cruz and
                  Naoto Yanai},
  title        = {Order-Fair Consensus in the Permissionless Setting},
  booktitle    = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography
                  Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494105.3526239},
  doi          = {10.1145/3494105.3526239},
  timestamp    = {Wed, 25 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/KelkarDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/KuzumaITMM22,
  author       = {Tomoki Kuzuma and
                  Raimu Isuzugawa and
                  Kodai Toyoda and
                  Daiki Miyahara and
                  Takaaki Mizuki},
  editor       = {Jason Paul Cruz and
                  Naoto Yanai},
  title        = {Card-based Single-shuffle Protocols for Secure Multiple-input {AND}
                  and {XOR} Computations},
  booktitle    = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography
                  Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  pages        = {51--58},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494105.3526236},
  doi          = {10.1145/3494105.3526236},
  timestamp    = {Wed, 25 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/KuzumaITMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/Nuida22,
  author       = {Koji Nuida},
  editor       = {Jason Paul Cruz and
                  Naoto Yanai},
  title        = {How to Handle Invalid Queries for Malicious-Private Protocols Based
                  on Homomorphic Encryption},
  booktitle    = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography
                  Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  pages        = {15--25},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494105.3526238},
  doi          = {10.1145/3494105.3526238},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/Nuida22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/Vanhoef22,
  author       = {Mathy Vanhoef},
  editor       = {Jason Paul Cruz and
                  Naoto Yanai},
  title        = {A Time-Memory Trade-Off Attack on WPA3's {SAE-PK}},
  booktitle    = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography
                  Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  pages        = {27--37},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494105.3526235},
  doi          = {10.1145/3494105.3526235},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiapkc/Vanhoef22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiapkc/YouA22,
  author       = {Ilsun You and
                  Philip Virgil Astillo},
  editor       = {Jason Paul Cruz and
                  Naoto Yanai},
  title        = {IIMB-Lite: Lightweight Misbehavior Detection Approach for Insulin
                  Infusion System},
  booktitle    = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography
                  Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494105.3530252},
  doi          = {10.1145/3494105.3530252},
  timestamp    = {Wed, 25 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/YouA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiapkc/2022,
  editor       = {Jason Paul Cruz and
                  Naoto Yanai},
  title        = {{APKC} '22: Proceedings of the 9th {ACM} on {ASIA} Public-Key Cryptography
                  Workshop, APKC@AsiaCCS 2022, Nagasaki, Japan, 30 May 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494105},
  doi          = {10.1145/3494105},
  isbn         = {978-1-4503-9174-0},
  timestamp    = {Wed, 25 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiapkc/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DAnversOV21,
  author       = {Jan{-}Pieter D'Anvers and
                  Emmanuela Orsini and
                  Frederik Vercauteren},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458295},
  doi          = {10.1145/3457338.3458295},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DAnversOV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EbinaMSW21,
  author       = {Masahiro Ebina and
                  Jumpei Mita and
                  Junji Shikata and
                  Yohei Watanabe},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Efficient Threshold Public Key Encryption from the Computational Bilinear
                  Diffie-Hellman Assumption},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458296},
  doi          = {10.1145/3457338.3458296},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EbinaMSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Espitau21,
  author       = {Thomas Espitau},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Mitaka: Faster, Simpler, Parallelizable and Maskable Hash-and-Sign
                  Signatures on {NTRU} Lattices},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458293},
  doi          = {10.1145/3457338.3458293},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Espitau21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaraMT21,
  author       = {Keisuke Hara and
                  Takahiro Matsuda and
                  Keisuke Tanaka},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Receiver Selective Opening Chosen Ciphertext Secure Identity-Based
                  Encryption},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {51--59},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458294},
  doi          = {10.1145/3457338.3458294},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HaraMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KoyamaTMM21,
  author       = {Hiroto Koyama and
                  Kodai Toyoda and
                  Daiki Miyahara and
                  Takaaki Mizuki},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {New Card-based Copy Protocols Using Only Random Cuts},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458297},
  doi          = {10.1145/3457338.3458297},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KoyamaTMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Peng21,
  author       = {Kun Peng},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Perfect {ZK} Argument of Knowledge of Discrete Logarithm in {A} Cyclic
                  Group with Unknown Order},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458287},
  doi          = {10.1145/3457338.3458287},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Peng21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShibataY21,
  author       = {Toshiya Shibata and
                  Kazuki Yoneyama},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Universally Composable Forward Secure Dynamic Searchable Symmetric
                  Encryption},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458290},
  doi          = {10.1145/3457338.3458290},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShibataY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2021asiapkc,
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338},
  doi          = {10.1145/3457338},
  isbn         = {978-1-4503-8401-8},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2021asiapkc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IkematsuFKYTY20,
  author       = {Yasuhiko Ikematsu and
                  Ryoya Fukasaku and
                  Momonari Kudo and
                  Masaya Yasuda and
                  Katsuyuki Takashima and
                  Kazuhiro Yokoyama},
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem},
  booktitle    = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {36--44},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940.3388956},
  doi          = {10.1145/3384940.3388956},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IkematsuFKYTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NakanishiYMP20,
  author       = {Toru Nakanishi and
                  Hiromi Yoshino and
                  Tomoki Murakami and
                  Guru{-}Vamsi Policharla},
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity
                  and Isolation Using Bilinear-Map Accumulator},
  booktitle    = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {9--18},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940.3388959},
  doi          = {10.1145/3384940.3388959},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NakanishiYMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NoguchiHY20,
  author       = {Ryoga Noguchi and
                  Yoshikazu Hanatani and
                  Kazuki Yoneyama},
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Verification of Group Key Management of {IEEE} 802.21 using ProVerif},
  booktitle    = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {19--27},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940.3388960},
  doi          = {10.1145/3384940.3388960},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NoguchiHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TiepeltD20,
  author       = {Marcel Tiepelt and
                  Jan{-}Pieter D'Anvers},
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Exploiting Decryption Failures in Mersenne Number Cryptosystems},
  booktitle    = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {45--54},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940.3388957},
  doi          = {10.1145/3384940.3388957},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TiepeltD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ToyodaMMS20,
  author       = {Kodai Toyoda and
                  Daiki Miyahara and
                  Takaaki Mizuki and
                  Hideaki Sone},
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Six-Card Finite-Runtime {XOR} Protocol with Only Random Cut},
  booktitle    = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {2--8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940.3388961},
  doi          = {10.1145/3384940.3388961},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ToyodaMMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wang20,
  author       = {Peter Shaojui Wang},
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Insider Collusion Attack on Distributed Machine Learning System and
                  its Solutions - {A} Case of {SVM}},
  booktitle    = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940.3390638},
  doi          = {10.1145/3384940.3390638},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Wang20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangIAT20,
  author       = {Yuntao Wang and
                  Yasuhiko Ikematsu and
                  Koichiro Akiyama and
                  Tsuyoshi Takagi},
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Cryptanalysis of GiophantusTM Schemes against Hybrid Attack},
  booktitle    = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {28--35},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940.3388958},
  doi          = {10.1145/3384940.3388958},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangIAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020asiapkc,
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940},
  doi          = {10.1145/3384940},
  isbn         = {978-1-4503-7607-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020asiapkc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Abdouli0CMM19,
  author       = {Ameera Salem Al Abdouli and
                  Emanuele Bellini and
                  Florian Caullery and
                  Marcos Manzano and
                  V{\'{\i}}ctor Mateu},
  editor       = {Keita Emura and
                  Takaaki Mizuki},
  title        = {Rank-metric Encryption on Arm-Cortex {M0:} Porting code-based cryptography
                  to lightweight devices},
  booktitle    = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3327958.3329544},
  doi          = {10.1145/3327958.3329544},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Abdouli0CMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Emura19,
  author       = {Keita Emura},
  editor       = {Keita Emura and
                  Takaaki Mizuki},
  title        = {Session details: Invited Talk},
  booktitle    = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3344278},
  doi          = {10.1145/3344278},
  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Emura19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FukumitsuH19,
  author       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  editor       = {Keita Emura and
                  Takaaki Mizuki},
  title        = {A Tightly-Secure Lattice-Based Multisignature},
  booktitle    = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019},
  pages        = {3--11},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3327958.3329542},
  doi          = {10.1145/3327958.3329542},
  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FukumitsuH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MatsudaTK19,
  author       = {Yoshitatsu Matsuda and
                  Tadanori Teruya and
                  Kenji Kashiwabara},
  editor       = {Keita Emura and
                  Takaaki Mizuki},
  title        = {Efficient Estimation of Number of Short Lattice Vectors in Search
                  Space under Randomness Assumption},
  booktitle    = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3327958.3329543},
  doi          = {10.1145/3327958.3329543},
  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MatsudaTK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Mizuki19,
  author       = {Takaaki Mizuki},
  editor       = {Keita Emura and
                  Takaaki Mizuki},
  title        = {Session details: Session 1},
  booktitle    = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3344279},
  doi          = {10.1145/3344279},
  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Mizuki19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Sakai19,
  author       = {Yusuke Sakai},
  editor       = {Keita Emura and
                  Takaaki Mizuki},
  title        = {Recent Advances in Attribute-Based Signatures},
  booktitle    = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3327958.3329545},
  doi          = {10.1145/3327958.3329545},
  timestamp    = {Thu, 18 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Sakai19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019asiapkc,
  editor       = {Keita Emura and
                  Takaaki Mizuki},
  title        = {Proceedings of the 6th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2019, Auckland, New Zealand, July 8, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3327958},
  doi          = {10.1145/3327958},
  isbn         = {978-1-4503-6784-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2019asiapkc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbeHMS18,
  author       = {Yuta Abe and
                  Yu{-}ichi Hayashi and
                  Takaaki Mizuki and
                  Hideaki Sone},
  editor       = {Keita Emura and
                  Jae Hong Seo and
                  Yohei Watanabe},
  title        = {Five-Card {AND} Protocol in Committed Format Using Only Practical
                  Shuffles},
  booktitle    = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018},
  pages        = {3--8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197507.3197510},
  doi          = {10.1145/3197507.3197510},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AbeHMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BelliniCHMM18,
  author       = {Emanuele Bellini and
                  Florian Caullery and
                  Alexandros Hasikos and
                  Marc Manzano and
                  V{\'{\i}}ctor Mateu},
  editor       = {Keita Emura and
                  Jae Hong Seo and
                  Yohei Watanabe},
  title        = {You Shall Not Pass! (Once Again): An IoT Application of Post-quantum
                  Stateful Signature Schemes},
  booktitle    = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197507.3197512},
  doi          = {10.1145/3197507.3197512},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BelliniCHMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Faz-HernandezLO18,
  author       = {Armando Faz{-}Hern{\'{a}}ndez and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Ana Karina D. S. de Oliveira},
  editor       = {Keita Emura and
                  Jae Hong Seo and
                  Yohei Watanabe},
  title        = {SoK: {A} Performance Evaluation of Cryptographic Instruction Sets
                  on Modern Architectures},
  booktitle    = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018},
  pages        = {9--18},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197507.3197511},
  doi          = {10.1145/3197507.3197511},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Faz-HernandezLO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimGKL18,
  author       = {Jon{-}Lark Kim and
                  Lucky Galvez and
                  Young{-}Sik Kim and
                  Nari Lee},
  editor       = {Keita Emura and
                  Jae Hong Seo and
                  Yohei Watanabe},
  title        = {A New LRPC-Kronecker Product Codes Based Public-Key Cryptography},
  booktitle    = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018},
  pages        = {25--33},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197507.3197513},
  doi          = {10.1145/3197507.3197513},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KimGKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Lauer18,
  author       = {Sebastian Lauer},
  editor       = {Keita Emura and
                  Jae Hong Seo and
                  Yohei Watanabe},
  title        = {On Several Verifiable Random Functions and the q-decisional Bilinear
                  Diffie-Hellman Inversion Assumption},
  booktitle    = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018},
  pages        = {45--51},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197507.3197515},
  doi          = {10.1145/3197507.3197515},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Lauer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Teruya18,
  author       = {Tadanori Teruya},
  editor       = {Keita Emura and
                  Jae Hong Seo and
                  Yohei Watanabe},
  title        = {A Note on Subgroup Security in Pairing-Based Cryptography},
  booktitle    = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018},
  pages        = {35--43},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197507.3197514},
  doi          = {10.1145/3197507.3197514},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Teruya18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UrbanikJ18,
  author       = {David Urbanik and
                  David Jao},
  editor       = {Keita Emura and
                  Jae Hong Seo and
                  Yohei Watanabe},
  title        = {SoK: The Problem Landscape of {SIDH}},
  booktitle    = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018},
  pages        = {53--60},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197507.3197516},
  doi          = {10.1145/3197507.3197516},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/UrbanikJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Yamakawa18,
  author       = {Takashi Yamakawa},
  editor       = {Keita Emura and
                  Jae Hong Seo and
                  Yohei Watanabe},
  title        = {Towards Ideal Self-bilinear Map},
  booktitle    = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197507.3197508},
  doi          = {10.1145/3197507.3197508},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Yamakawa18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asiapkc,
  editor       = {Keita Emura and
                  Jae Hong Seo and
                  Yohei Watanabe},
  title        = {Proceedings of the 5th {ACM} on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3197507},
  doi          = {10.1145/3197507},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2018asiapkc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HanzlikK17,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak},
  editor       = {Joonsang Baek and
                  Rui Zhang},
  title        = {Two-Move and Setup-Free Blind Signatures with Perfect Blindness},
  booktitle    = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055504.3055505},
  doi          = {10.1145/3055504.3055505},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HanzlikK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeLLJJ17,
  author       = {Jingnan He and
                  Bao Li and
                  Xianhui Lu and
                  Dingding Jia and
                  Wenpan Jing},
  editor       = {Joonsang Baek and
                  Rui Zhang},
  title        = {{KDM} and Selective Opening Secure {IBE} Based on the {LWE} Problem},
  booktitle    = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055504.3055508},
  doi          = {10.1145/3055504.3055508},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HeLLJJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KitamuraSNO17,
  author       = {Takuya Kitamura and
                  Kazumasa Shinagawa and
                  Takashi Nishide and
                  Eiji Okamoto},
  editor       = {Joonsang Baek and
                  Rui Zhang},
  title        = {One-time Programs with Cloud Storage and Its Application to Electronic
                  Money},
  booktitle    = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055504.3055507},
  doi          = {10.1145/3055504.3055507},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KitamuraSNO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SlowikW17,
  author       = {Marcin Slowik and
                  Marta Wszola},
  editor       = {Joonsang Baek and
                  Rui Zhang},
  title        = {An Efficient Verification of {CL-LRSW} Signatures and a Pseudonym
                  Certificate System},
  booktitle    = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {13--23},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055504.3055506},
  doi          = {10.1145/3055504.3055506},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SlowikW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TanZMT17,
  author       = {Gaosheng Tan and
                  Rui Zhang and
                  Hui Ma and
                  Yang Tao},
  editor       = {Joonsang Baek and
                  Rui Zhang},
  title        = {Access Control Encryption Based on {LWE}},
  booktitle    = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055504.3055509},
  doi          = {10.1145/3055504.3055509},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TanZMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asiapkc,
  editor       = {Joonsang Baek and
                  Rui Zhang},
  title        = {Proceedings of the 4th {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055504},
  doi          = {10.1145/3055504},
  isbn         = {978-1-4503-4973-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2017asiapkc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0003RM16,
  author       = {Poulami Das and
                  Debapriya Basu Roy and
                  Debdeep Mukhopadhyay},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Rui Zhang},
  title        = {Improved Atomicity to Prevent {HCCA} on {NIST} Curves},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898420.2901921},
  doi          = {10.1145/2898420.2901921},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0003RM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AzarderakhshJKK16,
  author       = {Reza Azarderakhsh and
                  David Jao and
                  Kassem Kalach and
                  Brian Koziel and
                  Christopher Leonardi},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Rui Zhang},
  title        = {Key Compression for Isogeny-Based Cryptosystems},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898420.2898421},
  doi          = {10.1145/2898420.2898421},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AzarderakhshJKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BuchmannBG0KMSV16,
  author       = {Johannes Buchmann and
                  Niklas B{\"{u}}scher and
                  Florian G{\"{o}}pfert and
                  Stefan Katzenbeisser and
                  Juliane Kr{\"{a}}mer and
                  Daniele Micciancio and
                  Sander Siim and
                  Christine van Vredendaal and
                  Michael Walter},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Rui Zhang},
  title        = {Creating Cryptographic Challenges Using Multi-Party Computation: The
                  {LWE} Challenge},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898420.2898422},
  doi          = {10.1145/2898420.2898422},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BuchmannBG0KMSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KieferM16,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Rui Zhang},
  title        = {Blind Password Registration for Verifier-based {PAKE}},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
  pages        = {39--48},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898420.2898424},
  doi          = {10.1145/2898420.2898424},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KieferM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuB16,
  author       = {Jiayang Liu and
                  Jingguo Bi},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Rui Zhang},
  title        = {Cryptanalysis of a Fast Private Information Retrieval Protocol},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
  pages        = {56--60},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898420.2898427},
  doi          = {10.1145/2898420.2898427},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NishimuraHMS16,
  author       = {Akihiro Nishimura and
                  Yu{-}ichi Hayashi and
                  Takaaki Mizuki and
                  Hideaki Sone},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Rui Zhang},
  title        = {An Implementation of Non-Uniform Shuffle for Secure Multi-Party Computation},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
  pages        = {49--55},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898420.2898425},
  doi          = {10.1145/2898420.2898425},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NishimuraHMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Santoso16,
  author       = {Bagus Santoso},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Rui Zhang},
  title        = {Refining Identification Scheme based on Isomorphism of Polynomials
                  with Two Secrets: a New Theoretical and Practical Analysis},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
  pages        = {31--38},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898420.2898423},
  doi          = {10.1145/2898420.2898423},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Santoso16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016asiapkc,
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Rui Zhang},
  title        = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key
                  Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898420},
  doi          = {10.1145/2898420},
  isbn         = {978-1-4503-4286-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016asiapkc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AnadaAS14,
  author       = {Hiroaki Anada and
                  Seiko Arita and
                  Kouichi Sakurai},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yunlei Zhao},
  title        = {Attribute-based signatures without pairings via the fiat-shamir paradigm},
  booktitle    = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key
                  Cryptography, June 3, 2014, Kyoto, Japan},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600694.2600696},
  doi          = {10.1145/2600694.2600696},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AnadaAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AritaH14,
  author       = {Seiko Arita and
                  Sari Handa},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yunlei Zhao},
  title        = {Two applications of multilinear maps: group key exchange and witness
                  encryption},
  booktitle    = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key
                  Cryptography, June 3, 2014, Kyoto, Japan},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600694.2600699},
  doi          = {10.1145/2600694.2600699},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AritaH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CabarcasGW14,
  author       = {Daniel Cabarcas and
                  Florian G{\"{o}}pfert and
                  Patrick Weiden},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yunlei Zhao},
  title        = {Provably secure {LWE} encryption with smallish uniform noise and secret},
  booktitle    = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key
                  Cryptography, June 3, 2014, Kyoto, Japan},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600694.2600695},
  doi          = {10.1145/2600694.2600695},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CabarcasGW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OharaSYIO14,
  author       = {Kazuma Ohara and
                  Yusuke Sakai and
                  Fumiaki Yoshida and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yunlei Zhao},
  title        = {Privacy-preserving smart metering with verifiability for both billing
                  and energy management},
  booktitle    = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key
                  Cryptography, June 3, 2014, Kyoto, Japan},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600694.2600700},
  doi          = {10.1145/2600694.2600700},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/OharaSYIO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Ohkubo14,
  author       = {Miyako Ohkubo},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yunlei Zhao},
  title        = {Introduction of structure-preserving signatures},
  booktitle    = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key
                  Cryptography, June 3, 2014, Kyoto, Japan},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600694.2600701},
  doi          = {10.1145/2600694.2600701},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Ohkubo14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangS14,
  author       = {Liang Feng Zhang and
                  Reihaneh Safavi{-}Naini},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yunlei Zhao},
  title        = {Generalized homomorphic MACs with efficient verification},
  booktitle    = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key
                  Cryptography, June 3, 2014, Kyoto, Japan},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600694.2600697},
  doi          = {10.1145/2600694.2600697},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangT14,
  author       = {Wenbin Zhang and
                  Chik How Tan},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yunlei Zhao},
  title        = {A new perturbed matsumoto-imai signature scheme},
  booktitle    = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key
                  Cryptography, June 3, 2014, Kyoto, Japan},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600694.2600698},
  doi          = {10.1145/2600694.2600698},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014asiapkc,
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yunlei Zhao},
  title        = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key
                  Cryptography, June 3, 2014, Kyoto, Japan},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2600694},
  isbn         = {978-1-4503-2801-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014asiapkc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChuGLMZ13,
  author       = {Dalin Chu and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Zhe Liu and
                  Volker M{\"{u}}ller and
                  Yang Zhang},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based
                  sensor nodes},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {39--44},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484398},
  doi          = {10.1145/2484389.2484398},
  timestamp    = {Mon, 17 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChuGLMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Hanaoka13,
  author       = {Goichiro Hanaoka},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {On the properties of public key encryption from group signatures},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484391},
  doi          = {10.1145/2484389.2484391},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Hanaoka13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KitaharaYNS13,
  author       = {Motoki Kitahara and
                  Takanori Yasuda and
                  Takashi Nishide and
                  Kouichi Sakurai},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {Upper bound of the length of information embedd in {RSA} public key
                  efficiently},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484396},
  doi          = {10.1145/2484389.2484396},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KitaharaYNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaZY13,
  author       = {Di Ma and
                  Yan Zhu and
                  Mengyang Yu},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {End-to-end aggregate authentication of time-series data},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484400},
  doi          = {10.1145/2484389.2484400},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MaZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PurushothamaA13,
  author       = {B. R. Purushothama and
                  B. B. Amberker},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {Secure group key management scheme based on dual receiver cryptosystem},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {45--50},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484399},
  doi          = {10.1145/2484389.2484399},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PurushothamaA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QinLCC13,
  author       = {Baodong Qin and
                  Shengli Liu and
                  Kefei Chen and
                  Manuel Charlemagne},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {Leakage-resilient lossy trapdoor functions and public-key encryption},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484393},
  doi          = {10.1145/2484389.2484393},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/QinLCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiongYZYH13,
  author       = {Hao Xiong and
                  Tsz Hon Yuen and
                  Cong Zhang and
                  Siu{-}Ming Yiu and
                  Yi Jun He},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {Leakage-resilient certificateless public key encryption},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484394},
  doi          = {10.1145/2484389.2484394},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XiongYZYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YamakawaY0HK13,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms
                  for {CCA} secure key encapsulation mechanism},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484395},
  doi          = {10.1145/2484389.2484395},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YamakawaY0HK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YasudaDTS13,
  author       = {Takanori Yasuda and
                  Jintai Ding and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {A variant of rainbow with shorter secret key and faster signature
                  generation},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484401},
  doi          = {10.1145/2484389.2484401},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YasudaDTS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013asiapkc,
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2484389},
  isbn         = {978-1-4503-2069-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2013asiapkc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics