What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from ASIACRYPT 2009
Year
Venue
Title
2009
ASIACRYPT
A Framework for Universally Composable Non-committing Blind Signatures
Masayuki Abe
Miyako Ohkubo
2009
ASIACRYPT
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
Anja Lehmann
Stefano Tessaro
2009
ASIACRYPT
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings
2009
ASIACRYPT
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
Mathias Herrmann
Alexander May
2009
ASIACRYPT
Cache-Timing Template Attacks
Billy Bob Brumley
Risto M. Hakala
2009
ASIACRYPT
Cascade Encryption Revisited
Peter Gazi
Ueli Maurer
2009
ASIACRYPT
Cryptanalysis of the Square Cryptosystems
Olivier Billet
Gilles Macario-Rat
2009
ASIACRYPT
Efficient Public Key Encryption Based on Ideal Lattices
Damien Stehlé
Ron Steinfeld
Keisuke Tanaka
Keita Xagawa
2009
ASIACRYPT
Factoring <i>pq</i><sup>2</sup> with Quadratic Forms: Nice Cryptanalyses
Guilhem Castagnos
Antoine Joux
Fabien Laguillaumie
Phong Q. Nguyen
2009
ASIACRYPT
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
Vadim Lyubashevsky
2009
ASIACRYPT
Foundations of Non-malleable Hash and One-Way Functions
Alexandra Boldyreva
David Cash
Marc Fischlin
Bogdan Warinschi
2009
ASIACRYPT
Group Encryption: Non-interactive Realization in the Standard Model
Julien Cathalo
Benoît Libert
Moti Yung
2009
ASIACRYPT
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Mihir Bellare
Zvika Brakerski
Moni Naor
Thomas Ristenpart
Gil Segev
Hovav Shacham
Scott Yilek
2009
ASIACRYPT
Hierarchical Predicate Encryption for Inner-Products
Tatsuaki Okamoto
Katsuyuki Takashima
2009
ASIACRYPT
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!
Yusuke Naito
Kazuki Yoneyama
Lei Wang
Kazuo Ohta
2009
ASIACRYPT
Improved Cryptanalysis of Skein
Jean-Philippe Aumasson
Çagdas Çalik
Willi Meier
Onur Özen
Raphael C.-W. Phan
Kerem Varici
2009
ASIACRYPT
Improved Generic Algorithms for 3-Collisions
★
Best Paper
Antoine Joux
Stefan Lucks
2009
ASIACRYPT
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
Seung Geol Choi
Dana Dachman-Soled
Tal Malkin
Hoeteck Wee
2009
ASIACRYPT
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
Eric Brier
Shahram Khazaei
Willi Meier
Thomas Peyrin
2009
ASIACRYPT
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
Florian Mendel
Christian Rechberger
Martin Schläffer
2009
ASIACRYPT
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Frederik Armknecht
Roel Maes
Ahmad-Reza Sadeghi
Berk Sunar
Pim Tuyls
2009
ASIACRYPT
Non-malleable Statistically Hiding Commitment from Any One-Way Function
Zongyang Zhang
Zhenfu Cao
Ning Ding
Rong Ma
2009
ASIACRYPT
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
Jonathan Katz
Arkady Yerukhimovich
2009
ASIACRYPT
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
Tibor Jager
Jörg Schwenk
2009
ASIACRYPT
On the Power of Two-Party Quantum Cryptography
Louis Salvail
Christian Schaffner
Miroslava Sotáková
2009
ASIACRYPT
Preimages for Step-Reduced SHA-2
Kazumaro Aoki
Jian Guo
Krystian Matusiewicz
Yu Sasaki
Lei Wang
2009
ASIACRYPT
Proofs of Storage from Homomorphic Identification Protocols
Giuseppe Ateniese
Seny Kamara
Jonathan Katz
2009
ASIACRYPT
PSS Is Secure against Random Fault Attacks
Jean-Sébastien Coron
Avradip Mandal
2009
ASIACRYPT
Quantum-Secure Coin-Flipping and Applications
Ivan Damgård
Carolin Lunemann
2009
ASIACRYPT
Rebound Attack on the Full Lane Compression Function
Krystian Matusiewicz
Ivica Nikolic
María Naya-Plasencia
Yu Sasaki
Martin Schläffer
2009
ASIACRYPT
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
Mario Lamberger
Florian Mendel
Christian Rechberger
Vincent Rijmen
Martin Schläffer
2009
ASIACRYPT
Related-Key Cryptanalysis of the Full AES-192 and AES-256
Alex Biryukov
Dmitry Khovratovich
2009
ASIACRYPT
Secure Multi-party Computation Minimizing Online Rounds
Seung Geol Choi
Ariel Elbaz
Tal Malkin
Moti Yung
2009
ASIACRYPT
Secure Two-Party Computation Is Practical
Benny Pinkas
Thomas Schneider
Nigel P. Smart
Stephen C. Williams
2009
ASIACRYPT
Security Bounds for the Design of Code-Based Cryptosystems
Matthieu Finiasz
Nicolas Sendrier
2009
ASIACRYPT
Security Notions and Generic Constructions for Client Puzzles
Liqun Chen
Paul Morrissey
Nigel P. Smart
Bogdan Warinschi
2009
ASIACRYPT
Signature Schemes with Bounded Leakage Resilience
Jonathan Katz
Vinod Vaikuntanathan
2009
ASIACRYPT
Simple Adaptive Oblivious Transfer without Random Oracle
Kaoru Kurosawa
Ryo Nojima
2009
ASIACRYPT
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Jonathan Katz
Vinod Vaikuntanathan
2009
ASIACRYPT
The Intel AES Instructions Set and the SHA-3 Candidates
Ryad Benadjila
Olivier Billet
Shay Gueron
Matthew J. B. Robshaw
2009
ASIACRYPT
The Key-Dependent Attack on Block Ciphers
Xiaorui Sun
Xuejia Lai
2009
ASIACRYPT
Zero Knowledge in the Random Oracle Model, Revisited
Hoeteck Wee