


default search action
ASIACRYPT 2018: Brisbane, QLD, Australia
- Thomas Peyrin, Steven D. Galbraith:

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11273, Springer 2018, ISBN 978-3-030-03328-6
Symmetric-Key Cryptanalysis
- Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo

, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. 3-34 - Tomer Ashur

, Maria Eichlseder
, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier:
Cryptanalysis of MORUS. 35-64 - Ling Song, Jian Guo, Danping Shi, San Ling

:
New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions. 65-95 - Geoffroy Couteau

, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella:
On the Concrete Security of Goldreich's Pseudorandom Generator. 96-124
Public Key and Identity-Based Encryption
- Fuyuki Kitagawa, Keisuke Tanaka:

A Framework for Achieving KDM-CCA Secure Public-Key Encryption. 127-157 - Haiyang Xue

, Xianhui Lu, Bao Li, Bei Liang
, Jingnan He:
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism. 158-189 - Dennis Hofheinz, Dingding Jia, Jiaxin Pan

:
Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks. 190-220 - Tibor Jager, Rafael Kurek:

Short Digital Signatures and ID-KEMs via Truncation Collision Resistance. 221-250
Asiacrypt 2018 Award Paper I
- Shuichi Katsumata, Shota Yamada, Takashi Yamakawa:

Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. 253-282
Side-Channels
- Pierre Karpman, Daniel S. Roche:

New Instantiations of the CRYPTO 2017 Masking Schemes. 285-314 - Christoph Dobraunig

, Maria Eichlseder
, Hannes Groß, Stefan Mangard
, Florian Mendel
, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. 315-342 - Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain:

Tight Private Circuits: Achieving Probing Security with the Least Refreshing. 343-372 - Alex Biryukov

, Aleksei Udovenko:
Attacks and Countermeasures for White-box Designs. 373-402
Signatures
- Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:

Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys. 405-434 - Dan Boneh, Manu Drijvers, Gregory Neven:

Compact Multi-signatures for Smaller Blockchains. 435-464 - Russell W. F. Lai

, Raymond K. H. Tai, Harry W. H. Wong
, Sherman S. M. Chow:
Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption. 465-492 - Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka:

Attribute-Based Signatures for Unbounded Languages from Standard Assumptions. 493-522
Asiacrypt 2018 Award Paper II
Leakage-Resilient Cryptography
- Dahmun Goudarzi, Antoine Joux, Matthieu Rivain:

How to Securely Compute with Noisy Leakage in Quasilinear Complexity. 547-574 - Yu Chen, Yuyu Wang

, Hong-Sheng Zhou
:
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation. 575-606
Functional/Inner Product/Predicate Encryption
- Junichi Tomida, Katsuyuki Takashima:

Unbounded Inner Product Functional Encryption from Bilinear Maps. 609-639 - Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:

Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption. 640-672 - Jie Chen, Junqing Gong, Hoeteck Wee:

Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding. 673-702 - Jérémy Chotard, Edouard Dufour Sans, Romain Gay

, Duong Hieu Phan
, David Pointcheval:
Decentralized Multi-Client Functional Encryption for Inner Product. 703-732 - Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker

:
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p. 733-764

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














