Showing 41 - 53 results of 53 for search '"Asiacrypt"', query time: 0.44s Refine Results
  1. 41
    ... been shown by Fuller et al. (ASIACRYPT'13) that the entropy loss can be reduced if the requirement...
    Get full text
    Article
  2. 42
    by Kiss, Ágnes
    Published 2021
    ... was first introduced by Katz and Malka (ASIACRYPT’11). We have shown that their protocol is practical...
    Get full text
    Get full text
    Others
  3. 43
    by Kyung-Ah Shim, Youngjoo An
    Published 2021-01-01
    ... to the group. At Asiacrypt 2010, Rückert constructed the first blind signature scheme using ideal...
    Get full text
    Article
  4. 44
    ... by Andreeva et al. at ASIACRYPT’19. An MFC is a tweakable cipher that computes s output blocks for a single...
    Get full text
    Article
  5. 45
    by Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic
    Published 2018-12-01
    ... The nonlinear invariant attack was introduced at ASIACRYPT 2016 by Todo et al.. The attack has...
    Get full text
    Article
  6. 46
    by Christoph Dobraunig, Bart Mennink
    Published 2020-01-01
    ... limit function results of Daemen et al. (ASIACRYPT 2017), both for arguing that state manipulation...
    Get full text
    Article
  7. 47
    by Shengfeng Xu, Xiangxue Li
    Published 2021-01-01
    ... efficient than the schemes of Döttling et al. (ASIACRYPT 2012), Kiltz et al. (PKC 2014) and Yu et al...
    Get full text
    Article
  8. 48
    .... To solve this problem, Rivest, Shamir and Tauman (ASIACRYPT 2001) introduced the notion of ring signature...
    Get full text
    Others
  9. 49
    ... framework, we revisit the quasilinear-complexity masking scheme of Goudarzi, Joux and Rivain (Asiacrypt 2018...
    Get full text
    Article
  10. 50
  11. 51
    by Paiva, Thales Areco Bandiera
    Published 2017
    ... aparentemente forte. Por três anos, o esquema não sofreu ataques críticos, até que na Asiacrypt de 2016 Guo...
    Get full text
    Others
  12. 52
    by Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
    Published 2017-02-01
    ...-plaintext setting. Furthermore, inspired by the methodology of Fouque et al. presented at ASIACRYPT 2014, we...
    Get full text
    Article
  13. 53
    by Thales Areco Bandiera Paiva
    Published 2017
    ... aparentemente forte. Por três anos, o esquema não sofreu ataques críticos, até que na Asiacrypt de 2016 Guo...
    Get full text