Login / Signup
ASIACRYPT (2)
2013
2017
2019
2023
2013
2023
Keyphrases
Publications
2023
Shuichi Katsumata
,
Michael Reichle
,
Yusuke Sakai
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions.
ASIACRYPT (2)
(2023)
Tian Qiu
,
Qiang Tang
Predicate Aggregate Signatures and Applications.
ASIACRYPT (2)
(2023)
Yuncong Zhang
,
Shifeng Sun
,
Ren Zhang
,
Dawu Gu
Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines.
ASIACRYPT (2)
(2023)
Khoa Nguyen
,
Partha Sarathi Roy
,
Willy Susilo
,
Yanhong Xu
Bicameral and Auditably Private Signatures.
ASIACRYPT (2)
(2023)
Johannes Blömer
,
Jan Bobolz
,
Laurens Porzenheim
A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices.
ASIACRYPT (2)
(2023)
Alexander R. Block
,
Albert Garreta
,
Jonathan Katz
,
Justin Thaler
,
Pratyush Ranjan Tiwari
,
Michal Zajac
Fiat-Shamir Security of FRI and Related SNARKs.
ASIACRYPT (2)
(2023)
Dakshita Khurana
,
Giulio Malavolta
,
Kabir Tomer
Weak Zero-Knowledge via the Goldreich-Levin Theorem.
ASIACRYPT (2)
(2023)
Min Zhang
,
Yu Chen
,
Chuanzhou Yao
,
Zhichao Wang
Sigma Protocols from Verifiable Secret Sharing and Their Applications.
ASIACRYPT (2)
(2023)
Elizabeth C. Crites
,
Markulf Kohlweiss
,
Bart Preneel
,
Mahdi Sedaghat
,
Daniel Slamanig
Threshold Structure-Preserving Signatures.
ASIACRYPT (2)
(2023)
Yuyu Wang
,
Chuanjie Su
,
Jiaxin Pan
,
Yu Chen
A Simple and Efficient Framework of Proof Systems for NP.
ASIACRYPT (2)
(2023)
Fabrice Benhamouda
,
Mariana Raykova
,
Karn Seth
Anonymous Counting Tokens.
ASIACRYPT (2)
(2023)
Valerie Fetzer
,
Michael Klooß
,
Jörn Müller-Quade
,
Markus Raiber
,
Andy Rupp
Universally Composable Auditable Surveillance.
ASIACRYPT (2)
(2023)
Benedikt Bünz
,
Binyi Chen
Protostar: Generic Efficient Accumulation/Folding for Special-Sound Protocols.
ASIACRYPT (2)
(2023)
Helger Lipmaa
On Black-Box Knowledge-Sound Commit-And-Prove SNARKs.
ASIACRYPT (2)
(2023)
volume 14439, 2023
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II
ASIACRYPT (2)
14439 (2023)
2022
Charlotte Bonte
,
Ilia Iliashenko
,
Jeongeun Park
,
Hilder V. L. Pereira
,
Nigel P. Smart
FINAL: Faster FHE Instantiated with NTRU and LWE.
ASIACRYPT (2)
(2022)
Yuyu Wang
,
Jiaxin Pan
Unconditionally Secure NIZK in the Fine-Grained Setting.
ASIACRYPT (2)
(2022)
Luca De Feo
,
Samuel Dobson
,
Steven D. Galbraith
,
Lukas Zobernig
SIDH Proof of Knowledge.
ASIACRYPT (2)
(2022)
Lorenzo Grassi
,
Bart Mennink
Security of Truncated Permutation Without Initial Value.
ASIACRYPT (2)
(2022)
Seonghak Kim
,
Minji Park
,
Jaehyung Kim
,
Taekyung Kim
,
Chohong Min
EvalRound Algorithm in CKKS Bootstrapping.
ASIACRYPT (2)
(2022)
Sungwook Kim
,
Hyeonbum Lee
,
Jae Hong Seo
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier.
ASIACRYPT (2)
(2022)
Yashvanth Kondi
,
Abhi Shelat
Improved Straight-Line Extraction in the Random Oracle Model with Applications to Signature Aggregation.
ASIACRYPT (2)
(2022)
Matilda Backendal
,
Felix Günther
,
Kenneth G. Paterson
Puncturable Key Wrapping and Its Applications.
ASIACRYPT (2)
(2022)
Gongxian Zeng
,
Junzuo Lai
,
Zhengan Huang
,
Yu Wang
,
Zhiming Zheng
DAG-Σ: A DAG-Based Sigma Protocol for Relations in CNF.
ASIACRYPT (2)
(2022)
Zeyu Liu
,
Daniele Micciancio
,
Yuriy Polyakov
Large-Precision Homomorphic Sign Evaluation Using FHEW/TFHE Bootstrapping.
ASIACRYPT (2)
(2022)
Akinori Hosoyamada
,
Takanori Isobe
,
Yosuke Todo
,
Kan Yasuda
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.
ASIACRYPT (2)
(2022)
Julien Duman
,
Dominik Hartmann
,
Eike Kiltz
,
Sabrina Kunzweiler
,
Jonas Lehmann
,
Doreen Riepel
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM.
ASIACRYPT (2)
(2022)
Ran Canetti
,
Pratik Sarkar
,
Xiao Wang
Triply Adaptive UC NIZK.
ASIACRYPT (2)
(2022)
Nan Wang
,
Sid Chi-Kin Chau
Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup.
ASIACRYPT (2)
(2022)
Antonin Leroux
A New Isogeny Representation and Applications to Cryptography.
ASIACRYPT (2)
(2022)
Helger Lipmaa
,
Janno Siim
,
Michal Zajac
Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK.
ASIACRYPT (2)
(2022)
Yaobin Shen
,
Ferdinand Sibleyras
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.
ASIACRYPT (2)
(2022)
Guilhem Castagnos
,
Fabien Laguillaumie
,
Ida Tucker
.
ASIACRYPT (2)
(2022)
Wouter Castryck
,
Thomas Decru
,
Marc Houben
,
Frederik Vercauteren
Horizontal Racewalking Using Radical Isogenies.
ASIACRYPT (2)
(2022)
Riddhi Ghosal
,
Paul Lou
,
Amit Sahai
Efficient NIZKs from LWE via Polynomial Reconstruction and "MPC in the Head".
ASIACRYPT (2)
(2022)
Thibauld Feneuil
,
Jules Maire
,
Matthieu Rivain
,
Damien Vergnaud
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.
ASIACRYPT (2)
(2022)
Wonseok Choi
,
Hwigyeom Kim
,
Jooyoung Lee
,
Yeongmin Lee
Multi-user Security of the Sum of Truncated Random Permutations.
ASIACRYPT (2)
(2022)
Norica Bacuieti
,
Joan Daemen
,
Seth Hoffert
,
Gilles Van Assche
,
Ronny Van Keer
Jammin' on the Deck.
ASIACRYPT (2)
(2022)
volume 13792, 2022
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part II
ASIACRYPT (2)
13792 (2022)
2021
Sayandeep Saha
,
Arnab Bag
,
Dirmanto Jap
,
Debdeep Mukhopadhyay
,
Shivam Bhasin
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks.
ASIACRYPT (2)
(2021)
Myrto Arapinis
,
Nikolaos Lamprou
,
Thomas Zacharias
Astrolabous: A Universally Composable Time-Lock Encryption Scheme.
ASIACRYPT (2)
(2021)
Yi Wang
,
Rongmao Chen
,
Xinyi Huang
,
Jianting Ning
,
Baosheng Wang
,
Moti Yung
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE.
ASIACRYPT (2)
(2021)
Francesco Berti
,
Chun Guo
,
Thomas Peters
,
François-Xavier Standaert
Efficient Leakage-Resilient MACs Without Idealized Assumptions.
ASIACRYPT (2)
(2021)
Marc Fischlin
,
Olga Sanina
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.
ASIACRYPT (2)
(2021)
Shuai Han
,
Shengli Liu
,
Dawu Gu
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Result and Optimal Tightness.
ASIACRYPT (2)
(2021)
Aron van Baarsen
,
Marc Stevens
On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups.
ASIACRYPT (2)
(2021)
Tancrède Lepoint
,
Sarvar Patel
,
Mariana Raykova
,
Karn Seth
,
Ni Trieu
Private Join and Compute from PIR with Default.
ASIACRYPT (2)
(2021)
Christiane Kuhn
,
Dennis Hofheinz
,
Andy Rupp
,
Thorsten Strufe
Onion Routing with Replies.
ASIACRYPT (2)
(2021)
Yu Long Chen
,
Stefano Tessaro
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.
ASIACRYPT (2)
(2021)
volume 13091, 2021
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II
ASIACRYPT (2)
13091 (2021)