Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,526,275 papers from all fields of science
Search
Sign In
Create Free Account
Asiacrypt
Known as:
AUSCRYPT
, International Conference on the Theory and Application of Cryptology and Information Security
Asiacrypt (also ASIACRYPT) is an important international conference for cryptography research. The full name of the conference is currently…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Cryptography
Cryptology Research Society of India
Eurocrypt
Hideki Imai
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Trick or Tweak: On the (In)security of OTR's Tweaks
Raphael Bost
,
Olivier Sanders
International Conference on the Theory and…
2016
Corpus ID: 14046881
Tweakable blockcipher (TBC) is a powerful tool to design authenticated encryption schemes as illustrated by Minematsu’s Offset…
Expand
2013
2013
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens
Nico Döttling
,
Thilo Mie
,
J. Müller-Quade
,
Tobias Nilges
Theory of Cryptography Conference
2013
Corpus ID: 1442459
Resettable hardware tokens, usually in the form of smart cards, are used for a variety of security-critical tasks in open…
Expand
2012
2012
Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier k-times Group Signature
Xingwen Zhao
,
Fangguo Zhang
Informatica
2012
Corpus ID: 16797998
Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier k-times Group Signature
2009
2009
Practical Threshold Signatures with Linear Secret Sharing Schemes
I. N. Bozkurt
,
K. Kaya
,
A. Selçuk
International Conference on Cryptology in Africa
2009
Corpus ID: 265850
Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among…
Expand
2009
2009
Hash Function with Variable Output Length
Jongho Ryu
,
Jungchan Na
Fifth International Joint Conference on INC, IMS…
2009
Corpus ID: 29479114
A hashing function is the mathematically complex algorithm that compresses an arbitrary input message into a fixed-length value…
Expand
2008
2008
On the Provable Security of Multi-Receiver Signcryption Schemes
S. D. Selvi
,
S. Vivek
,
R. Gopalakrishnan
,
Naga Naresh Karuturi
,
C. Rangan
IACR Cryptology ePrint Archive
2008
Corpus ID: 15749468
In ATC 2007, an identity based signcryption scheme for multiple receivers was proposed by Yu et al. In this paper, we first show…
Expand
2005
2005
Designated-Verifier Proxy Signature Schemes
Guilin Wang
IFIP International Information Security…
2005
Corpus ID: 2158379
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign…
Expand
2003
2003
Identity-Based Broadcasting
Y. Mu
,
W. Susilo
,
Yan-Xia Lin
International Conference on Cryptology in India
2003
Corpus ID: 7410598
In this paper, we introduce a new concept called “Identity-Based Broadcasting Encryption” (IBBE), which can be applied to dynamic…
Expand
1999
1999
Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
K. Lam
,
E. Okamoto
,
C. Xing
1999
Corpus ID: 62355656
1993
1993
Advances in Cryptology - ASIACRYPT '91: International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991. Proceedings
H. Imai
,
R. Rivest
,
Tsutomu Matsumoto
1993
Corpus ID: 117826128
The transition from mechanisms to electronic computers, 1940 to 1950.- Cryptanalysis of LOKI.- Improving resistance to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE