Asiacrypt

Results: 43



#Item
1

A simple and compact algorithm for SIDH with arbitrary degree isogenies Craig Costello and Huseyin Hisil December 5, 2017 ASIACRYPT

Add to Reading List

Source URL: www.craigcostello.com.au

Language: English - Date: 2017-12-05 05:27:16
    2

    Towards Robust Computation on Encrypted Data Manoj Prabhakaran & Mike Rosulek ASIACRYPT 2008 December 9, 2008

    Add to Reading List

    Source URL: web.engr.oregonstate.edu

    Language: English - Date: 2011-09-07 18:49:39
      3

      Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY

      Add to Reading List

      Source URL: www5.rz.rub.de

      Language: English - Date: 2011-12-05 07:34:34
        4Cryptography / Alex Biryukov / Argon2 / International Cryptology Conference / Asiacrypt / Workshop on Cryptographic Hardware and Embedded Systems / IACR / Biryukov / Steinfeld / PKC

        Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing Alex Biryukov; Dmitry Khovratovich

        Add to Reading List

        Source URL: www.math.auckland.ac.nz

        Language: English - Date: 2015-11-30 17:19:13
        5

        A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ’09, Lecture Notes in Computer Science Vol. 5912, pp. 232–249, Mitsuru Matsui ed., Springer-Verlag, 2009. This is the full version.

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2012-04-21 16:20:41
          6

          The Moral Character of Cryptographic Work Phillip Rogaway IACR Distinguished Lecture Asiacrypt 2015

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          - Date: 2015-12-02 01:13:58
            7Cryptography / Public-key cryptography / Password-authenticated key agreement / Eurocrypt / International Cryptology Conference / Asiacrypt / Digital signature / RSA

            Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

            Add to Reading List

            Source URL: www.normalesup.org

            Language: English - Date: 2016-06-01 09:22:58
            8

            Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006 Giuseppe Ateniese Department of Computer Science, The Johns Hopkins University 3400 North Charles Street, Baltimore, MD 21218, USA

            Add to Reading List

            Source URL: joye.site88.net

            Language: English - Date: 2015-09-04 19:43:19
              9

              Published in P. Sarkar and T. Iwata, Eds, Advances in Cryptology − ASIACRYPT 2014, Part II, volof Lecture Notes in Computer Science, pp. 1-21, Springer, 2014. Concise Multi-Challenge CCA-Secure Encryption and Si

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-09-04 19:44:09
                10

                A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems Asiacrypt 2003, Taipei Kaoru Kurosawa 1 , Katja Schmidt-Samoa 2 , Tsuyoshi Takagi 2 1

                Add to Reading List

                Source URL: conf.ncku.edu.tw

                Language: English - Date: 2003-12-17 07:15:58
                  UPDATE