Asiacrypt

Results: 43



#Item
21Eurocrypt / Asiacrypt / International Cryptology Conference / Py / Year of birth missing / Tom Berson / Auditing / Corporate governance / PKC / Cryptography / Committees / Workshop on Cryptographic Hardware and Embedded Systems

MINUTES IACR BOARD MEETING CRYPTO’12 UCSB, 19 AUGUSTO PENING M ATTERS AtPreneel opens the meeting and he briefly goes around to confirm attendees and establish who is holding proxies. The agenda is appr

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-08-16 17:22:10
22Tom Berson / Workshop on Cryptographic Hardware and Embedded Systems / International Cryptology Conference / Asiacrypt / PKC / Theory of Cryptography Conference / Journal of Cryptology / Bart Preneel / Cryptography / International Association for Cryptologic Research / Eurocrypt

Microsoft PowerPoint - IACR_Membership_Meeting_EC2013_publicv1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-08-16 17:55:40
23Bimal Kumar Roy / Science / Indian Statistical Institute / Cryptography / Education in Kolkata / India / Asiacrypt / Association of Commonwealth Universities / Year of birth missing / Cryptology Research Society of India / Indocrypt

Curriculum Vitæ Bimal Kumar Roy Director, Indian Statistical Institute www.isical.ac.in/~bimal

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2015-02-25 23:53:37
24Algebraic number theory / Integer factorization algorithms / Finite fields / Computational hardness assumptions / Logarithms / Discrete logarithm / Quadratic sieve / XTR / Integer factorization / Abstract algebra / Mathematics / Algebra

Main text appears in T. Okamoto (Ed.): Advances in Cryptology – ASIACRYPT 2000, Springer-Verlag LNCS 1976, pp, ISBNAddendum does not appear in proceedings. Security of Cryptosystems Based on Cl

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:48
25Commitment scheme / Universal composability / Oblivious transfer / Semantic security / RSA / Diffie–Hellman key exchange / Communications protocol / Cipher / Cryptography / Cryptographic protocols / ID-based encryption

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-02 11:56:16
26Oblivious transfer / Asiacrypt / International Cryptology Conference / Algorithmic Number Theory Symposium / Cryptography / Proxy re-encryption / Lecture Notes in Computer Science

Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2013-09-11 11:45:30
27Elliptic curve cryptography / Twisted Edwards curve / Vehicle Identification Number

A version of this paper appears in Advances in Cryptology - ASIACRYPT 2008, LNCS Vol. 5350, pp. 326–343. J. Pieprzyk ed., Springer-Verlag, 2008. Twisted Edwards Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gar

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-14 12:25:46
28Cryptography / Group signature / Vehicle Identification Number

Remarks on “Analysis of One Popular Group Signature Scheme” in Asiacrypt 2006 Giuseppe Ateniese1 , Jan Camenisch2 , Marc Joye3 , and Gene Tsudik4 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 14:28:48
29Eurocrypt / Academic publishing / Cryptology ePrint Archive / International Association for Cryptologic Research / Asiacrypt / Theory of Cryptography Conference / International Cryptology Conference

IACR Guidelines for Authors Sept 2014∗ Dear Author, The purpose of this document is to clarify aspects of submission to a publication of the IACR. These guidelines complement other guidelines available on the IACR webs

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-09-22 14:38:03
30Digital signature / Commitment scheme / Random oracle / XTR / Public-key cryptography / BLS / Cryptography / Blind signature / Group signature

Full version of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report[removed]Limitations on Transformations from Composite-

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-09-20 15:10:08
UPDATE