What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from ASIACRYPT 2007
Year
Venue
Title
2007
ASIACRYPT
A Key Recovery Attack on Edon80
Martin Hell
Thomas Johansson
2007
ASIACRYPT
A Kilobit Special Number Field Sieve Factorization
Kazumaro Aoki
Jens Franke
Thorsten Kleinjung
Arjen K. Lenstra
Dag Arne Osvik
2007
ASIACRYPT
A Non-interactive Shuffle with Pairing Based Verifiability
Jens Groth
Steve Lu
2007
ASIACRYPT
A Simple Variant of the Merkle-Damgård Scheme with a Permutation
Shoichi Hirose
Je Hong Park
Aaram Yun
2007
ASIACRYPT
Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings
2007
ASIACRYPT
Anonymous Quantum Communication
Gilles Brassard
Anne Broadbent
Joseph Fitzsimons
Sébastien Gambs
Alain Tapp
2007
ASIACRYPT
Authenticated Key Exchange and Key Encapsulation in the Standard Model
★
Invited paper
Tatsuaki Okamoto
2007
ASIACRYPT
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
Ueli Maurer
Dominik Raub
2007
ASIACRYPT
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
Matthew Green
Susan Hohenberger
2007
ASIACRYPT
Boosting Merkle-Damgård Hashing for Message Authentication
Kan Yasuda
2007
ASIACRYPT
Bounded CCA2-Secure Encryption
Ronald Cramer
Goichiro Hanaoka
Dennis Hofheinz
Hideki Imai
Eike Kiltz
Rafael Pass
Abhi Shelat
Vinod Vaikuntanathan
2007
ASIACRYPT
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
Vipul Goyal
Ryan Moriarty
Rafail Ostrovsky
Amit Sahai
2007
ASIACRYPT
Cryptanalysis of Grindahl
★
Best Paper
Thomas Peyrin
2007
ASIACRYPT
Cryptanalysis of the Tiger Hash Function
Florian Mendel
Vincent Rijmen
2007
ASIACRYPT
Efficient Byzantine Agreement with Faulty Minority
Zuzana Beerliová-Trubíniová
Martin Hirt
Micha Riser
2007
ASIACRYPT
Faster Addition and Doubling on Elliptic Curves
★
Best Paper
Daniel J. Bernstein
Tanja Lange
2007
ASIACRYPT
Fully Anonymous Group Signatures Without Random Oracles
Jens Groth
2007
ASIACRYPT
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Jacques Patarin
Valérie Nachef
Côme Berbain
2007
ASIACRYPT
Group Encryption
Aggelos Kiayias
Yiannis Tsiounis
Moti Yung
2007
ASIACRYPT
How to Build a Hash Function from Any Collision-Resistant Function
Thomas Ristenpart
Thomas Shrimpton
2007
ASIACRYPT
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
Cécile Delerablée
2007
ASIACRYPT
Information-Theoretic Security Without an Honest Majority
Anne Broadbent
Alain Tapp
2007
ASIACRYPT
Known-Key Distinguishers for Some Block Ciphers
Lars R. Knudsen
Vincent Rijmen
2007
ASIACRYPT
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
Xavier Boyen
2007
ASIACRYPT
Multi-party Indirect Indexing and Applications
Matthew K. Franklin
Mark Gondree
Payman Mohassel
2007
ASIACRYPT
Obtaining Universally Composable Security: Towards the Bare Bones of Trust
★
Invited paper
Ran Canetti
2007
ASIACRYPT
On Efficient Message Authentication Via Block Cipher Design Techniques
Goce Jakimoski
K. P. Subbalakshmi
2007
ASIACRYPT
On Privacy Models for RFID
Serge Vaudenay
2007
ASIACRYPT
On Tweaking Luby-Rackoff Blockciphers
David Goldenberg
Susan Hohenberger
Moses Liskov
Elizabeth Crump Schwartz
Hakan Seyalioglu
2007
ASIACRYPT
Relations Among Notions of Non-malleability for Encryption
Rafael Pass
Abhi Shelat
Vinod Vaikuntanathan
2007
ASIACRYPT
Secure Protocols with Asymmetric Trust
Ivan Damgård
Yvo Desmedt
Matthias Fitzi
Jesper Buus Nielsen
2007
ASIACRYPT
Seven-Property-Preserving Iterated Hashing: ROX
Elena Andreeva
Gregory Neven
Bart Preneel
Thomas Shrimpton
2007
ASIACRYPT
Simple and Efficient Perfectly-Secure Asynchronous MPC
Zuzana Beerliová-Trubíniová
Martin Hirt
2007
ASIACRYPT
Symmetric Key Cryptography on Modern Graphics Hardware
Jason Yang
James Goodman
2007
ASIACRYPT
Two-Party Computing with Encrypted Data
Seung Geol Choi
Ariel Elbaz
Ari Juels
Tal Malkin
Moti Yung
2007
ASIACRYPT
When <i>e</i>-th Roots Become Easier Than Factoring
Antoine Joux
David Naccache
Emmanuel Thomé