ASIACRYPT 2012 Dec. 2, 2012 to Dec. 6, 2012, Beijing,China

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions Masayuki Abe , Markulf Kohlweiss , Melissa Chase , Bernardo David , Ryo Nishimaki , Miyako Ohkubo N/A
Dual Form Signatures: An Approach for Proving Security from Static Assumptions Michael Gerbush , Allison Lewko , Adam Oneill , Brent Waters N/A
Breaking pairing-based cryptosystems using T pairing over GF(397) Takuya Hayashi , Takeshi Shimoyama , Naoyuki Shinohara , Tsuyoshi Takagi N/A
On the (Im)possibility of Projecting Property in Prime-Order Setting Jae hong Seo N/A Security
Pairing-based Cryptography: Past, Present, and Future Dan Boneh N/A Security
Optimal Reductions of Some Decisional Problems to the Rank Problem Jorge luis Villar N/A Security
Signature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust , Carmit Hazay , Jesper buus Nielsen , Peter sebastian Nordholt , Angela Zottarel N/A
Completeness for Symmetric Two-Party Functionalities C Revisited Yehuda Lindell , Eran Omri , Hila Zarosim N/A
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing Mihir Bellare , Viet tung Hoang , Phillip Rogaway N/A
The Generalized Randomized Iterate and its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions Rosario Gennaro , Scott Ames , Muthuramakrishnan Venkitasubramaniam N/A
Perfect Algebraic Immune Functions Yin Zhang , Dongdai Lin , Meicheng Liu N/A
Differential Analysis of the LED Block Cipher Florian Mendel , Vincent Rijmen , Deniz Toz , Kerem Varici N/A
PRINCEC A Low-latency Block Cipher for Pervasive Computing Applications Christof Paar , Julia Borghoff , Anne Canteaut , Tim Gneysu , Elif bilge Kavun , Miroslav Knezevic , Lars r. Knudsen , Gregor Leander , Ventzislav Nikov , Christan Rechberger , Peter Rombouts , Soeren s. Thomsen , And tolga Yalcin N/A
Analysis of differential attacks in ARX constructions Gaetan Leurent N/A Security
Integral and Multidimensional Linear Distinguishers with Correlation Zero Gregor Leander , Andrey Bogdanov , Kaisa Nyberg , Meiqin Wang N/A
Differential Attacks Against Stream Cipher ZUC Hongjun Wu , Tao Huang , Phuong ha Nguyen , Huaxiong Wang , San Ling N/A
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher Rodolphe Lampe , Jacques Patarin , Yannick Seurin N/A
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound Wenling Wu , Liting Zhang , Han Sui , Peng Wang N/A
Understanding adaptivity: random systems revisited Dimitar Jetchev , Onur Ozen , Martijn Stam N/A
RKA-Security beyond the Linear Barrier: IBE, Encryption and Signatures Mihir Bellare , Kenneth g. Paterson , Susan Thomson N/A
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption Tatsuaki Okamoto , Katsuyuki Takashima N/A
Computing on Authenticated Data: New Privacy Definitions and Constructions Nuttapong Attrapadung , Benoit Libert , Thomas Peters N/A
A Coding-Theoretic Approach to Recovering Noisy RSA Keys Antigoni Polychroniadou , Kenneth g. Paterson , Dale Sibborn N/A
Certifying RSA Saqib a. Kakvi , Eike Kiltz , Alexander May N/A
ECM at Work Joppe w. Bos , Thorsten Kleinjung N/A
IND-CCA secure Cryptography based on a variant of the LPN Problem Nico Doettling , Joern Mller-quade , Anderson Nascimento N/A
Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures Ducas , Phong q. Nguyen N/A
Faster Gaussian Lattice Sampling using Lazy Floating-Point Arithmetic Ducas , Phong q. Nguyen N/A
On Polynomial Systems Arising from a Weil Descent Christophe Petit , Jean-jacques Quisquater N/A
Some Mathematical Mysteries in Lattices Chuanming Zong N/A Security
Provable Security of the Knudsen-Preneel Compression Functions Jooyoung Lee N/A Security
Optimal Collision Security in Double Block Length Hashing with Single Length Key Bart Mennink N/A Security
Bicliques for permutations: collision and preimage attacks in stronger settings Dmitry Khovratovich N/A Security
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks Wenling Wu , Yu Sasaki , Lei Wang , Shuang Wu N/A
Generic Related-key Attacks for HMAC Yu Sasaki , Lei Wang , Thomas Peyrin N/A
The Five-Card Trick Can Be Done with Four Cards Takaaki Mizuki , Michihito Kumamoto , Hideaki Sone N/A
A Mix-Net From Any CCA2 Secure Cryptosystem Shahram Khazaei , Tal Moran , Douglas Wikstrom N/A
How not to Prove Yourself: Pitfalls of Fiat-Shamir and Applications to Helios Bogdan Warinschi , David Bernhard , Olivier Pereira N/A
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations Kyle Brogle , Sharon Goldberg , Leonid Reyzin N/A
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise Abhishek Jain , Stephan Krenn , Krzysztof Pietrzak , And aris Tentes N/A
Calling out Cheaters: Covert Security With Public Verifiability Gilad Asharov , Claudio Orlandi N/A
A Unified Framework for UC from only OT Muthuramakrishnan Venkitasubramaniam , Huijia Lin , Rafael Pass N/A
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication Patrick Longa , Francesco Sica N/A
Shuffling Against Side-Channel Attacks: a Comprehensive Study with Cautionary Note Nicolas Veyrat-charvillon , Marcel Medwed , Stephanie Kerckhof , Francois-xavier Standaert N/A