What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from ASIACRYPT 2010
Year
Venue
Title
2010
ASIACRYPT
A Byte-Based Guess and Determine Attack on SOSEMANUK
Xiutao Feng
Jun Liu
Zhaocun Zhou
Chuankun Wu
Dengguo Feng
2010
ASIACRYPT
A Closer Look at Anonymity and Robustness in Encryption Schemes
Payman Mohassel
2010
ASIACRYPT
A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT
Eric Brier
Thomas Peyrin
2010
ASIACRYPT
A Group Signature Scheme from Lattice Assumptions
S. Dov Gordon
Jonathan Katz
Vinod Vaikuntanathan
2010
ASIACRYPT
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Jian Guo
San Ling
Christian Rechberger
Huaxiong Wang
2010
ASIACRYPT
Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
Masayuki Abe
2010
ASIACRYPT
Collision Attacks against the Knudsen-Preneel Compression Functions
Onur Özen
Martijn Stam
2010
ASIACRYPT
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
Carmit Hazay
Tomas Toft
2010
ASIACRYPT
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
Simon Knellwolf
Willi Meier
María Naya-Plasencia
2010
ASIACRYPT
Constant-Size Commitments to Polynomials and Their Applications
Aniket Kate
Gregory M. Zaverucha
Ian Goldberg
2010
ASIACRYPT
Cryptographic Hash Functions and the SHA-3 Competition
★
Invited talk
Bart Preneel
2010
ASIACRYPT
Cryptography, from Theory to Practice: A Personal Perspective
★
Invited talk
Hugo Krawczyk
2010
ASIACRYPT
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis
Kristiyan Haralambiev
Adriana López-Alt
Daniel Wichs
2010
ASIACRYPT
Efficient String-Commitment from Weak Bit-Commitment
Kai-Min Chung
Feng-Hao Liu
Chi-Jen Lu
Bo-Yin Yang
2010
ASIACRYPT
Faster Fully Homomorphic Encryption
Damien Stehlé
Ron Steinfeld
2010
ASIACRYPT
Finding Second Preimages of Short Messages for Hamsi-256
Thomas Fuhr
2010
ASIACRYPT
General Perfectly Secure Message Transmission Using Linear Codes
Qiushi Yang
Yvo Desmedt
2010
ASIACRYPT
Generic Compilers for Authenticated Key Exchange
Tibor Jager
Florian Kohlar
Sven Schäge
Jörg Schwenk
2010
ASIACRYPT
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Emmanuel Volte
Valérie Nachef
Jacques Patarin
2010
ASIACRYPT
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Orr Dunkelman
Nathan Keller
Adi Shamir
2010
ASIACRYPT
Lattice-Based Blind Signatures
Markus Rückert
2010
ASIACRYPT
Leakage Resilient ElGamal Encryption
Eike Kiltz
Krzysztof Pietrzak
2010
ASIACRYPT
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
Sarah Meiklejohn
Hovav Shacham
David Mandell Freeman
2010
ASIACRYPT
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro
Jihye Kim
Gene Tsudik
2010
ASIACRYPT
Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition
Chao Ning
Qiuliang Xu
2010
ASIACRYPT
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
Yu Sasaki
Yang Li
Lei Wang
Kazuo Sakiyama
Kazuo Ohta
2010
ASIACRYPT
On Invertible Sampling and Adaptive Security
Yuval Ishai
Abishek Kumarasubramanian
Claudio Orlandi
Amit Sahai
2010
ASIACRYPT
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
Robert Granger
2010
ASIACRYPT
Optimistic Concurrent Zero Knowledge
Alon Rosen
Abhi Shelat
2010
ASIACRYPT
Random Oracles with(out) Programmability
Marc Fischlin
Anja Lehmann
Thomas Ristenpart
Thomas Shrimpton
Martijn Stam
Stefano Tessaro
2010
ASIACRYPT
Rotational Rebound Attacks on Reduced Skein
★
Best Paper
Dmitry Khovratovich
Ivica Nikolic
Christian Rechberger
2010
ASIACRYPT
Short Non-interactive Zero-Knowledge Proofs
Jens Groth
2010
ASIACRYPT
Short Pairing-Based Non-interactive Zero-Knowledge Arguments
Jens Groth
2010
ASIACRYPT
Structured Encryption and Controlled Disclosure
Melissa Chase
Seny Kamara
2010
ASIACRYPT
The Degree of Regularity of HFE Systems
Vivien Dubois
Nicolas Gama
2010
ASIACRYPT
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
Ranjit Kumaresan
Arpita Patra
C. Pandu Rangan
2010
ASIACRYPT
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
Tibor Jager
Andy Rupp
2010
ASIACRYPT
The World Is Not Enough: Another Look on Second-Order DPA
François-Xavier Standaert
Nicolas Veyrat-Charvillon
Elisabeth Oswald
Benedikt Gierlichs
Marcel Medwed
Markus Kasper
Stefan Mangard