Skip to search formSkip to main contentSkip to account menu

Asiacrypt

Known as: AUSCRYPT, International Conference on the Theory and Application of Cryptology and Information Security 
Asiacrypt (also ASIACRYPT) is an important international conference for cryptography research. The full name of the conference is currently… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Tweakable blockcipher (TBC) is a powerful tool to design authenticated encryption schemes as illustrated by Minematsu’s Offset… 
2013
2013
Resettable hardware tokens, usually in the form of smart cards, are used for a variety of security-critical tasks in open… 
2012
2012
Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier k-times Group Signature 
2009
2009
Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among… 
2009
2009
A hashing function is the mathematically complex algorithm that compresses an arbitrary input message into a fixed-length value… 
2008
2008
In ATC 2007, an identity based signcryption scheme for multiple receivers was proposed by Yu et al. In this paper, we first show… 
2005
2005
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign… 
2003
2003
In this paper, we introduce a new concept called “Identity-Based Broadcasting Encryption” (IBBE), which can be applied to dynamic… 
1993
1993
The transition from mechanisms to electronic computers, 1940 to 1950.- Cryptanalysis of LOKI.- Improving resistance to…