Asiacrypt

Results: 43



#Item
1A simple and compact algorithm for  SIDH with arbitrary degree isogenies Craig Costello and Huseyin Hisil December 5, 2017 ASIACRYPT

A simple and compact algorithm for SIDH with arbitrary degree isogenies Craig Costello and Huseyin Hisil December 5, 2017 ASIACRYPT

Add to Reading List

Source URL: www.craigcostello.com.au

Language: English - Date: 2017-12-05 05:27:16
    2Towards Robust Computation on Encrypted Data Manoj Prabhakaran & Mike Rosulek ASIACRYPT 2008 December 9, 2008

    Towards Robust Computation on Encrypted Data Manoj Prabhakaran & Mike Rosulek ASIACRYPT 2008 December 9, 2008

    Add to Reading List

    Source URL: web.engr.oregonstate.edu

    Language: English - Date: 2011-09-07 18:49:39
      3Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul  HORST GÖRTZ INSTITUTE FOR IT-SECURITY

      Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY

      Add to Reading List

      Source URL: www5.rz.rub.de

      Language: English - Date: 2011-12-05 07:34:34
        4Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing  Alex Biryukov; Dmitry Khovratovich

        Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing Alex Biryukov; Dmitry Khovratovich

        Add to Reading List

        Source URL: www.math.auckland.ac.nz

        Language: English - Date: 2015-11-30 17:19:13
        5A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ’09, Lecture Notes in Computer Science Vol. 5912, pp. 232–249, Mitsuru Matsui ed., Springer-Verlag, 2009. This is the full version.

        A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ’09, Lecture Notes in Computer Science Vol. 5912, pp. 232–249, Mitsuru Matsui ed., Springer-Verlag, 2009. This is the full version.

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2012-04-21 16:20:41
          6The Moral Character of Cryptographic Work Phillip Rogaway IACR Distinguished Lecture Asiacrypt 2015

          The Moral Character of Cryptographic Work Phillip Rogaway IACR Distinguished Lecture Asiacrypt 2015

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          - Date: 2015-12-02 01:13:58
            7Fabrice Ben Hamouda--Guichoux  Í 1 B rue du Pont RoyalBagneux, France

            Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

            Add to Reading List

            Source URL: www.normalesup.org

            Language: English - Date: 2016-06-01 09:22:58
            8Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006 Giuseppe Ateniese Department of Computer Science, The Johns Hopkins University 3400 North Charles Street, Baltimore, MD 21218, USA

            Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006 Giuseppe Ateniese Department of Computer Science, The Johns Hopkins University 3400 North Charles Street, Baltimore, MD 21218, USA

            Add to Reading List

            Source URL: joye.site88.net

            Language: English - Date: 2015-09-04 19:43:19
              9Published in P. Sarkar and T. Iwata, Eds, Advances in Cryptology − ASIACRYPT 2014, Part II, volof Lecture Notes in Computer Science, pp. 1-21, Springer, 2014. Concise Multi-Challenge CCA-Secure Encryption and Si

              Published in P. Sarkar and T. Iwata, Eds, Advances in Cryptology − ASIACRYPT 2014, Part II, volof Lecture Notes in Computer Science, pp. 1-21, Springer, 2014. Concise Multi-Challenge CCA-Secure Encryption and Si

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-09-04 19:44:09
                10A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems Asiacrypt 2003, Taipei Kaoru Kurosawa 1 , Katja Schmidt-Samoa 2 , Tsuyoshi Takagi 2 1

                A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems Asiacrypt 2003, Taipei Kaoru Kurosawa 1 , Katja Schmidt-Samoa 2 , Tsuyoshi Takagi 2 1

                Add to Reading List

                Source URL: conf.ncku.edu.tw

                Language: English - Date: 2003-12-17 07:15:58