Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,378,471 papers from all fields of science
Search
Sign In
Create Free Account
Asiacrypt
Known as:
AUSCRYPT
, International Conference on the Theory and Application of Cryptology and Information Security
Asiacrypt (also ASIACRYPT) is an important international conference for cryptography research. The full name of the conference is currently…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Cryptography
Cryptology Research Society of India
Eurocrypt
Hideki Imai
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Enhancing accountability of electronic health record usage via patient-centric monitoring
D. Mashima
,
M. Ahamad
International Health Informatics Symposium
2012
Corpus ID: 5995896
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health…
Expand
2012
2012
Differential Attacks against Stream Cipher ZUC
Hongjun Wu
,
Tao Huang
,
Phuong Ha Nguyen
,
Huaxiong Wang
,
S. Ling
International Conference on the Theory and…
2012
Corpus ID: 13134961
Stream cipher ZUC is the core component in the 3GPP confidentiality and integrity algorithms 128-EEA3 and 128-EIA3. In this paper…
Expand
Highly Cited
2006
Highly Cited
2006
Parallel and Concurrent Security of the HB and HB+ Protocols
Jonathan Katz
,
J. Shin
IACR Cryptology ePrint Archive
2006
Corpus ID: 6139217
Juels andWeis (building on prior work of Hopper and Blum) propose and analyze two shared-key authentication protocols - HB and HB…
Expand
Highly Cited
2006
Highly Cited
2006
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings
Xuejia Lai
,
Kefei Chen
International Conference on the Theory and…
2006
Corpus ID: 7276373
Attacks on Hash Functions.- Finding SHA-1 Characteristics: General Results and Applications.- Improved Collision Search for SHA-0…
Expand
Highly Cited
2006
Highly Cited
2006
HIBE With Short Public Parameters Without Random Oracle
S. Chatterjee
,
P. Sarkar
International Conference on the Theory and…
2006
Corpus ID: 139912
At Eurocrypt 2005, Waters presented an identity based encryption (IBE) protocol which is secure in the full model without random…
Expand
2005
2005
Provable Efficient Certificateless Public Key Encryption
Yijuan Shi
,
Jianhua Li
IACR Cryptology ePrint Archive
2005
Corpus ID: 18043657
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography…
Expand
Highly Cited
2002
Highly Cited
2002
Toward Hierarchical Identity-Based Encryption
J. Horwitz
,
Ben Lynn
International Conference on the Theory and…
2002
Corpus ID: 3208921
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and…
Expand
Highly Cited
2001
Highly Cited
2001
One Round Threshold Discrete-Log Key Generation without Private Channels
Pierre-Alain Fouque
,
J. Stern
International Conference on Theory and Practice…
2001
Corpus ID: 11053558
Pedersen designed the first scheme for generating Discrete-Log keys without any trusted dealer in 1991. As this protocol is…
Expand
1996
1996
Hash Functions Based on Block Ciphers and Quaternary Codes
L. Knudsen
,
B. Preneel
International Conference on the Theory and…
1996
Corpus ID: 17596673
We consider constructions for cryptographic hash functions based on m-bit block ciphers. First we present a new attack on the…
Expand
1990
1990
Advances in Cryptology — AUSCRYPT '90
J. Seberry
,
J. Pieprzyk
Lecture Notes in Computer Science
1990
Corpus ID: 41532886
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE