Showing 1 - 20 results of 53 for search '"Asiacrypt"', query time: 0.63s Refine Results
  1. 1
    by Mostafizar Rahman, Goutam Paul
    Published 2020-01-01
    ...Recently, in Asiacrypt 2019, Bonnetain et al. have shown attacks by quantum adversaries on FX...
    Get full text
    Article
  2. 2
    by Hongluan Zhao, Guoyong Han, Letian Wang, Wen Wang
    Published 2020-01-01
    ...Mixed integer linear programming (MILP) model was presented by Sun et al. at Asiacrypt 2014...
    Get full text
    Article
  3. 3
    ... by Mendel et al. at Asiacrypt 2013 and later improved by Liu, Mendel and Wang at Asiacrypt 2017. Both...
    Get full text
    Article
  4. 4
    ... (Yasuda, CRYPTO 2011), 3kf9 (Zhang et al., ASIACRYPT 2012) and LightMAC_Plus (Naito, ASIACRYPT 2017...
    Get full text
    Article
  5. 5
    ... Recently, Hosoyamada and Sasaki (EUROCRYPT 2020), and Xiaoyang Dong et al. (ASIACRYPT 2020...
    Get full text
    Article
  6. 6
    by Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
    Published 2020-09-01
    ... proposed by Todo and Morii at FSE 2016. At ASIACRYPT 2016, Xiang et al. extended Mixed Integer Linear...
    Get full text
    Article
  7. 7
    ...'s security level is 128 bits and the correctness is improved compared with CGGI16 scheme in ASIACRYPT 2016...
    Get full text
    Article
  8. 8
    by Shisen Fang, Shaojun Yang, Yuexin Zhang
    Published 2020-11-01
    ... the learning with errors scheme of Agrawal et al. [Asiacrypt 2011], and its security relies on the difficulty...
    Get full text
    Article
  9. 9
    by Viet Cuong Trinh
    Published 2019-01-01
    ..., the notion of certificateless public key cryptography has been introduced by Riyami and Paterson at Asiacrypt...
    Get full text
    Article
  10. 10
    by Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You
    Published 2021-06-01
    ... Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016...
    Get full text
    Article
  11. 11
  12. 12
    by Moody Dustin, Paul Souradyuti, Smith-Tone Daniel
    Published 2016-06-01
    ... mode (Crypto 1989), Lucks proposed widening the size of the internal state of hash functions (Asiacrypt...
    Get full text
    Article
  13. 13
    by Guoyong Han, Hongluan Zhao, Chunquan Zhao
    Published 2019-01-01
    ... is proposed to attack the full AES by Bogdanov et al. in ASIACRYPT 2011. The attack can decrease computation...
    Get full text
    Article
  14. 14
    by Colin Chaigneau, Henri Gilbert
    Published 2016-12-01
    ... against AEZ v3 published at Asiacrypt 2015 by Fuhr, Leurent and Suder, we show that AEZ v4.1 remains...
    Get full text
    Article
  15. 15
    by Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
    Published 2017-06-01
    ... et al. (ASIACRYPT 2014) against COPA’s XOR mixing. Then we present a noncemisusing forgery against...
    Get full text
    Article
  16. 16
    ...) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis...
    Get full text
    Article
  17. 17
    by Hsieh, Hui-Ching, 謝惠菁
    Published 2011
    ... attack. However, their protocol requires the large space of the tag. And, in Asiacrypt 2008, Ouafi...
    Get full text
    Others
  18. 18
    by Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid
    Published 2021-07-01
    ...TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt’ 2018...
    Get full text
    Article
  19. 19
    by Meichun Cao, Wenying Zhang
    Published 2019-01-01
    ... domains (smaller and faster)” and improves the security weaknesses of the latter. At Asiacrypt...
    Get full text
    Article
  20. 20
    by Tatsuo Mitani, Akira Otsuka
    Published 2020-01-01
    ... that the plaintext is equal to zero. This is an adaptation of Benhamouda et al. (Asiacrypt 2014)....
    Get full text
    Article