default search action
25th ASIACRYPT 2019: Kobe, Japan - Part I
- Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11921, Springer 2019, ISBN 978-3-030-34577-8
Invited Talk
- Elaine Shi:
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey). 3-17
Best Paper
- Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes. 21-51
Lattices (1)
- Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang:
Middle-Product Learning with Rounding Problem and Its Applications. 55-81 - Qian Guo, Thomas Johansson, Jing Yang:
A Novel CCA Attack Using Decryption Errors Against LAC. 82-111 - Prabhanjan Ananth, Xiong Fan, Elaine Shi:
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More. 112-141
Symmetric Cryptography
- Akinori Hosoyamada, Tetsu Iwata:
4-Round Luby-Rackoff Construction is a qPRP. 145-174 - Wonseok Choi, ByeongHak Lee, Jooyoung Lee:
Indifferentiability of Truncated Random Permutations. 175-195 - Xavier Bonnetain, Léo Perrin, Shizhu Tian:
Anomalies and Vector Space Search: Tools for S-Box Analysis. 196-223
Isogenies (1)
- Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren:
CSI-FiSh: Efficient Isogeny Based Signatures Through Class Group Computations. 227-247 - Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso:
Verifiable Delay Functions from Supersingular Isogenies and Pairings. 248-277 - Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian:
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. 278-308
Obfuscation
- Dennis Hofheinz, Bogdan Ursu:
Dual-Mode NIZKs from Obfuscation. 311-341 - Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters:
Output Compression, MPC, and iO for Turing Machines. 342-370 - Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. 371-398
Multiparty Computation (1)
- Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu:
Valiant's Universal Circuits Revisited: An Overall Improvement and a Lower Bound. 401-425 - Sanjam Garg, Aarushi Goel, Abhishek Jain:
The Broadcast Message Complexity of Secure Multiparty Computation. 426-455 - Arpita Patra, Divya Ravi:
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation. 456-487 - Alexander Koch, Michael Schrempp, Michael Kirsten:
Card-Based Cryptography Meets Formal Verification. 488-517
Quantum
- Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik:
Quantum Algorithms for the Approximate k-List Problem and Their Application to Lattice Sieving. 521-551 - Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm. 552-583 - Minki Hhan, Keita Xagawa, Takashi Yamakawa:
Quantum Random Oracle Model with Auxiliary Input. 584-614 - Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden:
QFactory: Classically-Instructed Remote Secret Qubits Preparation. 615-645
E-cash and Blockchain
- Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi:
Quisquis: A New Design for Anonymous Cryptocurrencies. 649-678 - Florian Bourse, David Pointcheval, Olivier Sanders:
Divisible E-Cash from Constrained Pseudo-Random Functions. 679-708
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.