-
1“...Recently, in Asiacrypt 2019, Bonnetain et al. have shown attacks by quantum adversaries on FX...”
Get full text
Article -
2“...Mixed integer linear programming (MILP) model was presented by Sun et al. at Asiacrypt 2014...”
Get full text
Article -
3by Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao“... by Mendel et al. at Asiacrypt 2013 and later improved by Liu, Mendel and Wang at Asiacrypt 2017. Both...”
Published 2019-09-01
Get full text
Article -
4“... (Yasuda, CRYPTO 2011), 3kf9 (Zhang et al., ASIACRYPT 2012) and LightMAC_Plus (Naito, ASIACRYPT 2017...”
Get full text
Article -
5“... Recently, Hosoyamada and Sasaki (EUROCRYPT 2020), and Xiaoyang Dong et al. (ASIACRYPT 2020...”
Get full text
Article -
6“... proposed by Todo and Morii at FSE 2016. At ASIACRYPT 2016, Xiang et al. extended Mixed Integer Linear...”
Get full text
Article -
7“...'s security level is 128 bits and the correctness is improved compared with CGGI16 scheme in ASIACRYPT 2016...”
Get full text
Article -
8“... the learning with errors scheme of Agrawal et al. [Asiacrypt 2011], and its security relies on the difficulty...”
Get full text
Article -
9by Viet Cuong Trinh“..., the notion of certificateless public key cryptography has been introduced by Riyami and Paterson at Asiacrypt...”
Published 2019-01-01
Get full text
Article -
10“... Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016...”
Get full text
Article -
11by Bitansky, Nir, Canetti, Ran, Goldwasser, Shafi, Halevi, Shai, Kalai, Yael Tauman, Rothblum, Guy N.Get fulltext
Published 2014
Article -
12“... mode (Crypto 1989), Lucks proposed widening the size of the internal state of hash functions (Asiacrypt...”
Get full text
Article -
13“... is proposed to attack the full AES by Bogdanov et al. in ASIACRYPT 2011. The attack can decrease computation...”
Get full text
Article -
14“... against AEZ v3 published at Asiacrypt 2015 by Fuhr, Leurent and Suder, we show that AEZ v4.1 remains...”
Get full text
Article -
15“... et al. (ASIACRYPT 2014) against COPA’s XOR mixing. Then we present a noncemisusing forgery against...”
Get full text
Article -
16“...) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis...”
Get full text
Article -
17“... attack. However, their protocol requires the large space of the tag. And, in Asiacrypt 2008, Ouafi...”
Get full text
Others -
18“...TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt’ 2018...”
Get full text
Article -
19“... domains (smaller and faster)” and improves the security weaknesses of the latter. At Asiacrypt...”
Get full text
Article -
20“... that the plaintext is equal to zero. This is an adaptation of Benhamouda et al. (Asiacrypt 2014)....”
Get full text
Article