Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Asiacrypt

Known as: AUSCRYPT, International Conference on the Theory and Application of Cryptology and Information Security 
Asiacrypt (also ASIACRYPT) is an important international conference for cryptography research. The full name of the conference is currently… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A pseudorandom function (PRF) is a keyed function \(F : {\mathcal K}\times{\mathcal X}\rightarrow{\mathcal Y}\) where, for a… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We construct a simple fully homomorphic encryption scheme, using only elementary modular arithmetic. We use Gentry’s technique to… Expand
  • figure 1
Is this relevant?
2009
2009
Since the first feasible collision differential was given for MD5 in 2004 by Wang et al, a lot of work has been concentrated on… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In recent years, a large number of identity- based key agreement protocols from pairings have been proposed. Some of them are… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2006
2006
Significant progress in the design of special purpose hardware for supporting the Number Field Sieve (NFS) has been made. From a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the… Expand
Is this relevant?
2004
2004
Abstract We present an algorithm to compute the zeta function of an arbitrary hyperelliptic curve over a finite field Fq of… Expand
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper we introduce NTRUSIGN, a new family of signature schemes based on solving the approximate closest vector problem… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
A new variety of miniature carnation characterized by its rapid and continuous production of small red-purple blooms with a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and… Expand
Is this relevant?