Skip to search formSkip to main contentSkip to account menu

Asiacrypt

Known as: AUSCRYPT, International Conference on the Theory and Application of Cryptology and Information Security 
Asiacrypt (also ASIACRYPT) is an important international conference for cryptography research. The full name of the conference is currently… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health… 
2012
2012
Stream cipher ZUC is the core component in the 3GPP confidentiality and integrity algorithms 128-EEA3 and 128-EIA3. In this paper… 
Highly Cited
2006
Highly Cited
2006
Juels andWeis (building on prior work of Hopper and Blum) propose and analyze two shared-key authentication protocols - HB and HB… 
Highly Cited
2006
Highly Cited
2006
Attacks on Hash Functions.- Finding SHA-1 Characteristics: General Results and Applications.- Improved Collision Search for SHA-0… 
Highly Cited
2006
Highly Cited
2006
At Eurocrypt 2005, Waters presented an identity based encryption (IBE) protocol which is secure in the full model without random… 
2005
2005
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography… 
Highly Cited
2002
Highly Cited
2002
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and… 
Highly Cited
2001
Highly Cited
2001
Pedersen designed the first scheme for generating Discrete-Log keys without any trusted dealer in 1991. As this protocol is… 
1996
1996
We consider constructions for cryptographic hash functions based on m-bit block ciphers. First we present a new attack on the…