Search dblp for Publications

export results for "toc:db/conf/asiacrypt/asiacrypt2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/asiacrypt/AbeO09,
  author       = {Masayuki Abe and
                  Miyako Ohkubo},
  editor       = {Mitsuru Matsui},
  title        = {A Framework for Universally Composable Non-committing Blind Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {435--450},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_26},
  doi          = {10.1007/978-3-642-10366-7\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbeO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AokiGMSW09,
  author       = {Kazumaro Aoki and
                  Jian Guo and
                  Krystian Matusiewicz and
                  Yu Sasaki and
                  Lei Wang},
  editor       = {Mitsuru Matsui},
  title        = {Preimages for Step-Reduced {SHA-2}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {578--597},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_34},
  doi          = {10.1007/978-3-642-10366-7\_34},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AokiGMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ArmknechtMSST09,
  author       = {Frederik Armknecht and
                  Roel Maes and
                  Ahmad{-}Reza Sadeghi and
                  Berk Sunar and
                  Pim Tuyls},
  editor       = {Mitsuru Matsui},
  title        = {Memory Leakage-Resilient Encryption Based on Physically Unclonable
                  Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {685--702},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_40},
  doi          = {10.1007/978-3-642-10366-7\_40},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ArmknechtMSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AtenieseKK09,
  author       = {Giuseppe Ateniese and
                  Seny Kamara and
                  Jonathan Katz},
  editor       = {Mitsuru Matsui},
  title        = {Proofs of Storage from Homomorphic Identification Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {319--333},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_19},
  doi          = {10.1007/978-3-642-10366-7\_19},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AtenieseKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AumassonCMOPV09,
  author       = {Jean{-}Philippe Aumasson and
                  {\c{C}}agdas {\c{C}}alik and
                  Willi Meier and
                  Onur {\"{O}}zen and
                  Raphael C.{-}W. Phan and
                  Kerem Varici},
  editor       = {Mitsuru Matsui},
  title        = {Improved Cryptanalysis of Skein},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {542--559},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_32},
  doi          = {10.1007/978-3-642-10366-7\_32},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AumassonCMOPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BellareBNRSSY09,
  author       = {Mihir Bellare and
                  Zvika Brakerski and
                  Moni Naor and
                  Thomas Ristenpart and
                  Gil Segev and
                  Hovav Shacham and
                  Scott Yilek},
  editor       = {Mitsuru Matsui},
  title        = {Hedged Public-Key Encryption: How to Protect against Bad Randomness},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_14},
  doi          = {10.1007/978-3-642-10366-7\_14},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BellareBNRSSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BenadjilaBGR09,
  author       = {Ryad Benadjila and
                  Olivier Billet and
                  Shay Gueron and
                  Matthew J. B. Robshaw},
  editor       = {Mitsuru Matsui},
  title        = {The Intel {AES} Instructions Set and the {SHA-3} Candidates},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {162--178},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_10},
  doi          = {10.1007/978-3-642-10366-7\_10},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BenadjilaBGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BilletM09,
  author       = {Olivier Billet and
                  Gilles Macario{-}Rat},
  editor       = {Mitsuru Matsui},
  title        = {Cryptanalysis of the Square Cryptosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {451--468},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_27},
  doi          = {10.1007/978-3-642-10366-7\_27},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BilletM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BiryukovK09,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich},
  editor       = {Mitsuru Matsui},
  title        = {Related-Key Cryptanalysis of the Full {AES-192} and {AES-256}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_1},
  doi          = {10.1007/978-3-642-10366-7\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BiryukovK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoldyrevaCFW09,
  author       = {Alexandra Boldyreva and
                  David Cash and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Mitsuru Matsui},
  title        = {Foundations of Non-malleable Hash and One-Way Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {524--541},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_31},
  doi          = {10.1007/978-3-642-10366-7\_31},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoldyrevaCFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrierKMP09,
  author       = {Eric Brier and
                  Shahram Khazaei and
                  Willi Meier and
                  Thomas Peyrin},
  editor       = {Mitsuru Matsui},
  title        = {Linearization Framework for Collision Attacks: Application to CubeHash
                  and {MD6}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {560--577},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_33},
  doi          = {10.1007/978-3-642-10366-7\_33},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BrierKMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrumleyH09,
  author       = {Billy Bob Brumley and
                  Risto M. Hakala},
  editor       = {Mitsuru Matsui},
  title        = {Cache-Timing Template Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {667--684},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_39},
  doi          = {10.1007/978-3-642-10366-7\_39},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BrumleyH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CastagnosJLN09,
  author       = {Guilhem Castagnos and
                  Antoine Joux and
                  Fabien Laguillaumie and
                  Phong Q. Nguyen},
  editor       = {Mitsuru Matsui},
  title        = {Factoring \emph{pq}\({}^{\mbox{2}}\) with Quadratic Forms: Nice Cryptanalyses},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {469--486},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_28},
  doi          = {10.1007/978-3-642-10366-7\_28},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CastagnosJLN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CathaloLY09,
  author       = {Julien Cathalo and
                  Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Mitsuru Matsui},
  title        = {Group Encryption: Non-interactive Realization in the Standard Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {179--196},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_11},
  doi          = {10.1007/978-3-642-10366-7\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CathaloLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenMSW09,
  author       = {Liqun Chen and
                  Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Mitsuru Matsui},
  title        = {Security Notions and Generic Constructions for Client Puzzles},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {505--523},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_30},
  doi          = {10.1007/978-3-642-10366-7\_30},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiDMW09,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  editor       = {Mitsuru Matsui},
  title        = {Improved Non-committing Encryption with Applications to Adaptively
                  Secure Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {287--302},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_17},
  doi          = {10.1007/978-3-642-10366-7\_17},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiDMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiEMY09,
  author       = {Seung Geol Choi and
                  Ariel Elbaz and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Mitsuru Matsui},
  title        = {Secure Multi-party Computation Minimizing Online Rounds},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {268--286},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_16},
  doi          = {10.1007/978-3-642-10366-7\_16},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiEMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CoronM09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Avradip Mandal},
  editor       = {Mitsuru Matsui},
  title        = {{PSS} Is Secure against Random Fault Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {653--666},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_38},
  doi          = {10.1007/978-3-642-10366-7\_38},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CoronM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardL09,
  author       = {Ivan Damg{\aa}rd and
                  Carolin Lunemann},
  editor       = {Mitsuru Matsui},
  title        = {Quantum-Secure Coin-Flipping and Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_4},
  doi          = {10.1007/978-3-642-10366-7\_4},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FiniaszS09,
  author       = {Matthieu Finiasz and
                  Nicolas Sendrier},
  editor       = {Mitsuru Matsui},
  title        = {Security Bounds for the Design of Code-Based Cryptosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {88--105},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_6},
  doi          = {10.1007/978-3-642-10366-7\_6},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FiniaszS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GaziM09,
  author       = {Peter Gazi and
                  Ueli M. Maurer},
  editor       = {Mitsuru Matsui},
  title        = {Cascade Encryption Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {37--51},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_3},
  doi          = {10.1007/978-3-642-10366-7\_3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GaziM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HerrmannM09,
  author       = {Mathias Herrmann and
                  Alexander May},
  editor       = {Mitsuru Matsui},
  title        = {Attacking Power Generators Using Unravelled Linearization: When Do
                  We Output Too Much?},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {487--504},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_29},
  doi          = {10.1007/978-3-642-10366-7\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HerrmannM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JagerS09,
  author       = {Tibor Jager and
                  J{\"{o}}rg Schwenk},
  editor       = {Mitsuru Matsui},
  title        = {On the Analysis of Cryptographic Assumptions in the Generic Ring Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {399--416},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_24},
  doi          = {10.1007/978-3-642-10366-7\_24},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JagerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JouxL09,
  author       = {Antoine Joux and
                  Stefan Lucks},
  editor       = {Mitsuru Matsui},
  title        = {Improved Generic Algorithms for 3-Collisions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {347--363},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_21},
  doi          = {10.1007/978-3-642-10366-7\_21},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JouxL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KatzV09,
  author       = {Jonathan Katz and
                  Vinod Vaikuntanathan},
  editor       = {Mitsuru Matsui},
  title        = {Smooth Projective Hashing and Password-Based Authenticated Key Exchange
                  from Lattices},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {636--652},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_37},
  doi          = {10.1007/978-3-642-10366-7\_37},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KatzV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KatzV09a,
  author       = {Jonathan Katz and
                  Vinod Vaikuntanathan},
  editor       = {Mitsuru Matsui},
  title        = {Signature Schemes with Bounded Leakage Resilience},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {703--720},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_41},
  doi          = {10.1007/978-3-642-10366-7\_41},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KatzV09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KatzY09,
  author       = {Jonathan Katz and
                  Arkady Yerukhimovich},
  editor       = {Mitsuru Matsui},
  title        = {On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {197--213},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_12},
  doi          = {10.1007/978-3-642-10366-7\_12},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KatzY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaN09,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima},
  editor       = {Mitsuru Matsui},
  title        = {Simple Adaptive Oblivious Transfer without Random Oracle},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {334--346},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_20},
  doi          = {10.1007/978-3-642-10366-7\_20},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LambergerMRRS09,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Christian Rechberger and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Mitsuru Matsui},
  title        = {Rebound Distinguishers: Results on the Full Whirlpool Compression
                  Function},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_8},
  doi          = {10.1007/978-3-642-10366-7\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LambergerMRRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LehmannT09,
  author       = {Anja Lehmann and
                  Stefano Tessaro},
  editor       = {Mitsuru Matsui},
  title        = {A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix
                  Approach Practical},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {364--381},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_22},
  doi          = {10.1007/978-3-642-10366-7\_22},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LehmannT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Lyubashevsky09,
  author       = {Vadim Lyubashevsky},
  editor       = {Mitsuru Matsui},
  title        = {Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based
                  Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {598--616},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_35},
  doi          = {10.1007/978-3-642-10366-7\_35},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Lyubashevsky09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MatusiewiczNNSS09,
  author       = {Krystian Matusiewicz and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Martin Schl{\"{a}}ffer},
  editor       = {Mitsuru Matsui},
  title        = {Rebound Attack on the Full Lane Compression Function},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {106--125},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_7},
  doi          = {10.1007/978-3-642-10366-7\_7},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MatusiewiczNNSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MendelRS09,
  author       = {Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer},
  editor       = {Mitsuru Matsui},
  title        = {{MD5} Is Weaker Than Weak: Attacks on Concatenated Combiners},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {144--161},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_9},
  doi          = {10.1007/978-3-642-10366-7\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MendelRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaitoYWO09,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  editor       = {Mitsuru Matsui},
  title        = {How to Confirm Cryptosystems Security: The Original Merkle-Damg{\aa}rd
                  Is Still Alive!},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {382--398},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_23},
  doi          = {10.1007/978-3-642-10366-7\_23},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NaitoYWO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkamotoT09,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Mitsuru Matsui},
  title        = {Hierarchical Predicate Encryption for Inner-Products},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {214--231},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_13},
  doi          = {10.1007/978-3-642-10366-7\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OkamotoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PinkasSSW09,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Nigel P. Smart and
                  Stephen C. Williams},
  editor       = {Mitsuru Matsui},
  title        = {Secure Two-Party Computation Is Practical},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {250--267},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_15},
  doi          = {10.1007/978-3-642-10366-7\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PinkasSSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SalvailSS09,
  author       = {Louis Salvail and
                  Christian Schaffner and
                  Miroslava Sot{\'{a}}kov{\'{a}}},
  editor       = {Mitsuru Matsui},
  title        = {On the Power of Two-Party Quantum Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {70--87},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_5},
  doi          = {10.1007/978-3-642-10366-7\_5},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SalvailSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/StehleSTX09,
  author       = {Damien Stehl{\'{e}} and
                  Ron Steinfeld and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Mitsuru Matsui},
  title        = {Efficient Public Key Encryption Based on Ideal Lattices},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {617--635},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_36},
  doi          = {10.1007/978-3-642-10366-7\_36},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/StehleSTX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SunL09,
  author       = {Xiaorui Sun and
                  Xuejia Lai},
  editor       = {Mitsuru Matsui},
  title        = {The Key-Dependent Attack on Block Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_2},
  doi          = {10.1007/978-3-642-10366-7\_2},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SunL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Wee09,
  author       = {Hoeteck Wee},
  editor       = {Mitsuru Matsui},
  title        = {Zero Knowledge in the Random Oracle Model, Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {417--434},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_25},
  doi          = {10.1007/978-3-642-10366-7\_25},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Wee09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhangCDM09,
  author       = {Zongyang Zhang and
                  Zhenfu Cao and
                  Ning Ding and
                  Rong Ma},
  editor       = {Mitsuru Matsui},
  title        = {Non-malleable Statistically Hiding Commitment from Any One-Way Function},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {303--318},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_18},
  doi          = {10.1007/978-3-642-10366-7\_18},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZhangCDM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2009,
  editor       = {Mitsuru Matsui},
  title        = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7},
  doi          = {10.1007/978-3-642-10366-7},
  isbn         = {978-3-642-10365-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics