


default search action
25th ASIACRYPT 2019: Kobe, Japan - Part II
- Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11922, Springer 2019, ISBN 978-3-030-34620-1
Codes
- Yu Yu, Jiang Zhang, Jian Weng
, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise. 3-24 - Khoa Nguyen
, Hanh Tang
, Huaxiong Wang, Neng Zeng:
New Code-Based Privacy-Preserving Cryptographic Constructions. 25-55
Lattices (2)
- Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
:
An LLL Algorithm for Module Lattices. 59-90 - Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma:
Order-LWE and the Hardness of Ring-LWE with Entropic Secrets. 91-120 - Ngoc Khanh Nguyen:
On the Non-existence of Short Vectors in Random Module Lattices. 121-150
Authenticated Encryption
- Elena Andreeva
, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy
, Damian Vizár:
Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages. 153-182 - John Chan, Phillip Rogaway:
Anonymous AE. 183-208 - Jean Paul Degabriele, Christian Janson, Patrick Struck
:
Sponges Resist Leakage: The Case of Authenticated Encryption. 209-240
Isogenies (2)
- Michael Naehrig, Joost Renes:
Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography. 243-272 - Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong:
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves. 273-292 - Salim Ali Altug, Yilei Chen:
Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion. 293-322
Multilinear Maps
- Jean-Sébastien Coron, Hilder V. L. Pereira:
On Kilian's Randomization of Multilinear Map Encodings. 325-355 - Jean-Sébastien Coron, Luca Notarnicola:
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. 356-385 - Michel Abdalla
, Fabrice Benhamouda
, Alain Passelègue:
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps. 386-412
Homomorphic Encryption
- Jung Hee Cheon, Dongwoo Kim
, Duhyeong Kim, Hun-Hee Lee, Keewoo Lee:
Numerical Method for Comparison on Homomorphically Encrypted Numbers. 415-445 - Hao Chen, Ilaria Chillotti
, Yongsoo Song
:
Multi-Key Homomorphic Encryption from TFHE. 446-472 - Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio
:
Homomorphic Encryption for Finite Automata. 473-502
Combinatorial Cryptography
- Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient Explicit Constructions of Multipartite Secret Sharing Schemes. 505-536 - Michael A. Raskin
, Mark Simkin:
Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead. 537-563 - Kaoru Kurosawa:
How to Correct Errors in Multi-server PIR. 564-574
Multiparty Computation (2)
- Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti:
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens. 577-605 - Ignacio Cascudo
, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli:
Efficient UC Commitment Extension with Homomorphism for Free (and Applications). 606-635 - Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang
:
Scalable Private Set Union from Symmetric-Key Techniques. 636-666

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.