Skip to search formSkip to main contentSkip to account menu

Asiacrypt

Known as: AUSCRYPT, International Conference on the Theory and Application of Cryptology and Information Security 
Asiacrypt (also ASIACRYPT) is an important international conference for cryptography research. The full name of the conference is currently… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
After the introduction of some stream ciphers with the minimal internal state, the design idea of these ciphers (i.e. the design… 
2016
2016
We present fast and compact implementations of FourQ (ASI-ACRYPT 2015) on field-programmable gate arrays (FPGAs), and demonstrate… 
2016
2016
Tweakable blockcipher (TBC) is a powerful tool to design authenticated encryption schemes as illustrated by Minematsu’s Offset… 
2015
2015
Rank estimation is an important tool for side-channel evaluations laboratories. It allows determining the remaining security… 
2012
2012
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health… 
2008
2008
The vector decomposition problem (VDP) has been proposed as a computational problem on which to base the security of public key… 
2008
2008
In ATC 2007, an identity based signcryption scheme for multiple receivers was proposed by Yu et al. In this paper, we first show… 
2007
2007
Significant progress in the design of special purpose hardware for supporting the Number Field Sieve (NFS) has been made. From a… 
2005
2005
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign… 
2003
2003
In this paper, we introduce a new concept called “Identity-Based Broadcasting Encryption” (IBBE), which can be applied to dynamic…