IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of ASIACRYPT 2005

Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings , Springer
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log., Pascal Paillier, Damien Vergnaud, pp. 1-20
 PDF BibTeX
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?, David Jao, Stephen D. Miller, Ramarathnam Venkatesan, pp. 21-40
 PDF BibTeX
Adapting Density Attacks to Low-Weight Knapsacks., Phong Q. Nguyen, Jacques Stern, pp. 41-58
 PDF BibTeX
Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains., Vassil S. Dimitrov, Laurent Imbert, Pradeep Kumar Mishra, pp. 59-78
 PDF BibTeX
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation., Martin Hirt, Jesper Buus Nielsen, pp. 79-99
 PDF BibTeX
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations., Nuttapong Attrapadung, Hideki Imai, pp. 100-120
 PDF BibTeX
Revealing Additional Information in Two-Party Computations., Andreas Jakoby, Maciej Liskiewicz, pp. 121-135
 PDF BibTeX
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation., Vladimir Kolesnikov, pp. 136-155
 PDF BibTeX
Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes., Zhifang Zhang, Mulan Liu, Liangliang Xiao, pp. 156-173
 PDF BibTeX
Updatable Zero-Knowledge Databases., Moses Liskov, pp. 174-198
 PDF BibTeX
Simple and Tight Bounds for Information Reconciliation and Privacy Amplification., Renato Renner, Stefan Wolf, pp. 199-216
 PDF BibTeX
Quantum Anonymous Transmissions., Matthias Christandl, Stephanie Wehner, pp. 217-235
 PDF BibTeX
Privacy-Preserving Graph Algorithms in the Semi-honest Model., Justin Brickell, Vitaly Shmatikov, pp. 236-252
 PDF BibTeX
Spreading Alerts Quietly and the Subgroup Escape Problem., James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy, pp. 253-272
 PDF BibTeX
A Sender Verifiable Mix-Net and a New Proof of a Shuffle., Douglas Wikström, pp. 273-292
 PDF BibTeX
Universally Anonymizable Public-Key Encryption., Ryotaro Hayashi, Keisuke Tanaka, pp. 293-312
 PDF BibTeX
Fast Computation of Large Distributions and Its Cryptographic Applications., Alexander Maximov, Thomas Johansson, pp. 313-332
 PDF BibTeX
An Analysis of the XSL Algorithm., Carlos Cid, Gaëtan Leurent, pp. 333-352
 PDF BibTeX
New Applications of Time Memory Data Tradeoffs., Jin Hong, Palash Sarkar, pp. 353-372
 PDF BibTeX
Linear Cryptanalysis of the TSC Family of Stream Ciphers., Frédéric Muller, Thomas Peyrin, pp. 373-394
 PDF BibTeX
A Practical Attack on the Fixed RC4 in the WEP Mode., Itsik Mantin, pp. 395-411
 PDF BibTeX
A Near-Practical Attack Against B Mode of HBB., Joydip Mitra, pp. 412-424
 PDF BibTeX
New Improvements of Davies-Murphy Cryptanalysis., Sébastien Kunz-Jacques, Frédéric Muller, pp. 425-442
 PDF BibTeX
A Related-Key Rectangle Attack on the Full KASUMI., Eli Biham, Orr Dunkelman, Nathan Keller, pp. 443-461
 PDF BibTeX
Some Attacks Against a Double Length Hash Proposal., Lars R. Knudsen, Frédéric Muller, pp. 462-473
 PDF BibTeX
A Failure-Friendly Design Principle for Hash Functions., Stefan Lucks, pp. 474-494
 PDF BibTeX
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application., Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai, pp. 495-514
 PDF BibTeX
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps., Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater, pp. 515-532
 PDF BibTeX
Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps., Toru Nakanishi, Nobuo Funabiki, pp. 533-548
 PDF BibTeX
Modular Security Proofs for Key Agreement Protocols., Caroline Kudla, Kenneth G. Paterson, pp. 549-565
 PDF BibTeX
A Simple Threshold Authenticated Key Exchange from Short Secrets., Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval, pp. 566-584
 PDF BibTeX
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols., Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, pp. 585-604
 PDF BibTeX
Server-Aided Verification: Theory and Practice., Marc Girault, David Lefranc, pp. 605-623
 PDF BibTeX
Errors in Computational Complexity Proofs for Protocols., Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, pp. 624-643
 PDF BibTeX
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature)., Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo, pp. 644-661
 PDF BibTeX
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs., Craig Gentry, David Molnar, Zulfikar Ramzan, pp. 662-681
 PDF BibTeX
Universally Convertible Directed Signatures., Fabien Laguillaumie, Pascal Paillier, Damien Vergnaud, pp. 682-701
 PDF BibTeX

[ IACR home page ] © IACR