Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of asiacrypt 2009
Page
Title
1-18
Related-Key Cryptanalysis of the Full AES-192 and AES-256
19-36
The Key-Dependent Attack on Block Ciphers
37-51
Cascade Encryption Revisited
52-69
Quantum-Secure Coin-Flipping and Applications
70-87
On the Power of Two-Party Quantum Cryptography
88-105
Security Bounds for the Design of Code-Based Cryptosystems
106-125
Rebound Attack on the Full Lane Compression Function
126-143
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
144-161
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
162-178
The Intel AES Instructions Set and the SHA-3 Candidates
179-196
Group Encryption: Non-interactive Realization in the Standard Model
197-213
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
214-231
Hierarchical Predicate Encryption for Inner-Products
232-249
Hedged Public-Key Encryption: How to Protect against Bad Randomness
250-267
Secure Two-Party Computation Is Practical
268-286
Secure Multi-party Computation Minimizing Online Rounds
287-302
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
303-318
Non-malleable Statistically Hiding Commitment from Any One-Way Function
319-333
Proofs of Storage from Homomorphic Identification Protocols
334-346
Simple Adaptive Oblivious Transfer without Random Oracle
347-363
Improved Generic Algorithms for 3-Collisions
364-381
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
382-398
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!
399-416
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
417-434
Zero Knowledge in the Random Oracle Model, Revisited
435-450
A Framework for Universally Composable Non-committing Blind Signatures
451-468
Cryptanalysis of the Square Cryptosystems
469-486
Factoring
pq
2
with Quadratic Forms: Nice Cryptanalyses
487-504
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
505-523
Security Notions and Generic Constructions for Client Puzzles
524-541
Foundations of Non-malleable Hash and One-Way Functions
542-559
Improved Cryptanalysis of Skein
560-577
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
578-597
Preimages for Step-Reduced SHA-2
598-616
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
617-635
Efficient Public Key Encryption Based on Ideal Lattices
636-652
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
653-666
PSS Is Secure against Random Fault Attacks
667-684
Cache-Timing Template Attacks
685-702
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
703-720
Signature Schemes with Bounded Leakage Resilience