Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,220,488 papers from all fields of science
Search
Sign In
Create Free Account
Asiacrypt
Known as:
AUSCRYPT
, International Conference on the Theory and Application of Cryptology and Information Security
Asiacrypt (also ASIACRYPT) is an important international conference for cryptography research. The full name of the conference is currently…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Cryptography
Cryptology Research Society of India
Eurocrypt
Hideki Imai
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Necessary conditions for designing secure stream ciphers with the minimal internal states
V. Ghafari
,
Honggang Hu
,
Mohammadsadegh alizadeh
IACR Cryptology ePrint Archive
2017
Corpus ID: 27333661
After the introduction of some stream ciphers with the minimal internal state, the design idea of these ciphers (i.e. the design…
Expand
2016
2016
FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields
K. Järvinen
,
Andrea Miele
,
R. Azarderakhsh
,
P. Longa
IACR Cryptology ePrint Archive
2016
Corpus ID: 263876095
We present fast and compact implementations of FourQ (ASI-ACRYPT 2015) on field-programmable gate arrays (FPGAs), and demonstrate…
Expand
2016
2016
Trick or Tweak: On the (In)security of OTR's Tweaks
Raphael Bost
,
Olivier Sanders
International Conference on the Theory and…
2016
Corpus ID: 14046881
Tweakable blockcipher (TBC) is a powerful tool to design authenticated encryption schemes as illustrated by Minematsu’s Offset…
Expand
2015
2015
Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations
R. Poussier
,
Vincent Grosso
,
François-Xavier Standaert
Smart Card Research and Advanced Application…
2015
Corpus ID: 26832474
Rank estimation is an important tool for side-channel evaluations laboratories. It allows determining the remaining security…
Expand
2012
2012
Enhancing accountability of electronic health record usage via patient-centric monitoring
D. Mashima
,
M. Ahamad
International Health Informatics Symposium
2012
Corpus ID: 5995896
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health…
Expand
2008
2008
An Analysis of the Vector Decomposition Problem
S. Galbraith
,
E. Verheul
International Conference on Theory and Practice…
2008
Corpus ID: 714288
The vector decomposition problem (VDP) has been proposed as a computational problem on which to base the security of public key…
Expand
2008
2008
On the Provable Security of Multi-Receiver Signcryption Schemes
S. D. Selvi
,
S. Vivek
,
R. Gopalakrishnan
,
Naga Naresh Karuturi
,
C. Rangan
IACR Cryptology ePrint Archive
2008
Corpus ID: 15749468
In ATC 2007, an identity based signcryption scheme for multiple receivers was proposed by Yu et al. In this paper, we first show…
Expand
2007
2007
Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit
W. Geiselmann
,
R. Steinwandt
International Conference on the Theory and…
2007
Corpus ID: 8476685
Significant progress in the design of special purpose hardware for supporting the Number Field Sieve (NFS) has been made. From a…
Expand
2005
2005
Designated-Verifier Proxy Signature Schemes
Guilin Wang
IFIP International Information Security…
2005
Corpus ID: 2158379
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign…
Expand
2003
2003
Identity-Based Broadcasting
Y. Mu
,
W. Susilo
,
Yan-Xia Lin
International Conference on Cryptology in India
2003
Corpus ID: 7410598
In this paper, we introduce a new concept called “Identity-Based Broadcasting Encryption” (IBBE), which can be applied to dynamic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE