1![A simple and compact algorithm for SIDH with arbitrary degree isogenies Craig Costello and Huseyin Hisil December 5, 2017 ASIACRYPT A simple and compact algorithm for SIDH with arbitrary degree isogenies Craig Costello and Huseyin Hisil December 5, 2017 ASIACRYPT](https://www.pdfsearch.io/img/4a1f64fa72951aff45f41361779193bd.jpg) | Add to Reading ListSource URL: www.craigcostello.com.auLanguage: English - Date: 2017-12-05 05:27:16
|
---|
2![Towards Robust Computation on Encrypted Data Manoj Prabhakaran & Mike Rosulek ASIACRYPT 2008 December 9, 2008 Towards Robust Computation on Encrypted Data Manoj Prabhakaran & Mike Rosulek ASIACRYPT 2008 December 9, 2008](https://www.pdfsearch.io/img/694ff3adc0d21a3bdd05c3605dede7a3.jpg) | Add to Reading ListSource URL: web.engr.oregonstate.eduLanguage: English - Date: 2011-09-07 18:49:39
|
---|
3![Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY](https://www.pdfsearch.io/img/a8f10e08d6574e34dd84ba6370253785.jpg) | Add to Reading ListSource URL: www5.rz.rub.deLanguage: English - Date: 2011-12-05 07:34:34
|
---|
4![Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing Alex Biryukov; Dmitry Khovratovich Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing Alex Biryukov; Dmitry Khovratovich](https://www.pdfsearch.io/img/7c2af07e1df95da7375648847820a8f0.jpg) | Add to Reading ListSource URL: www.math.auckland.ac.nzLanguage: English - Date: 2015-11-30 17:19:13
|
---|
5![A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ’09, Lecture Notes in Computer Science Vol. 5912, pp. 232–249, Mitsuru Matsui ed., Springer-Verlag, 2009. This is the full version. A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ’09, Lecture Notes in Computer Science Vol. 5912, pp. 232–249, Mitsuru Matsui ed., Springer-Verlag, 2009. This is the full version.](https://www.pdfsearch.io/img/6b2a59d1e2022bb44f5fec17c835b73b.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2012-04-21 16:20:41
|
---|
6![The Moral Character of Cryptographic Work Phillip Rogaway IACR Distinguished Lecture Asiacrypt 2015 The Moral Character of Cryptographic Work Phillip Rogaway IACR Distinguished Lecture Asiacrypt 2015](https://www.pdfsearch.io/img/eb1b652c9a0fa998f0d6958948467dd3.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.edu- Date: 2015-12-02 01:13:58
|
---|
7![Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France](https://www.pdfsearch.io/img/3e6b1c06f306efe5347a7def6cc13f10.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2016-06-01 09:22:58
|
---|
8![Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006 Giuseppe Ateniese Department of Computer Science, The Johns Hopkins University 3400 North Charles Street, Baltimore, MD 21218, USA Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006 Giuseppe Ateniese Department of Computer Science, The Johns Hopkins University 3400 North Charles Street, Baltimore, MD 21218, USA](https://www.pdfsearch.io/img/357eae22697b14aa3cffa5603681a7c9.jpg) | Add to Reading ListSource URL: joye.site88.netLanguage: English - Date: 2015-09-04 19:43:19
|
---|
9![Published in P. Sarkar and T. Iwata, Eds, Advances in Cryptology − ASIACRYPT 2014, Part II, volof Lecture Notes in Computer Science, pp. 1-21, Springer, 2014. Concise Multi-Challenge CCA-Secure Encryption and Si Published in P. Sarkar and T. Iwata, Eds, Advances in Cryptology − ASIACRYPT 2014, Part II, volof Lecture Notes in Computer Science, pp. 1-21, Springer, 2014. Concise Multi-Challenge CCA-Secure Encryption and Si](https://www.pdfsearch.io/img/78225ec8f7cc13bc76efa8c0bc377106.jpg) | Add to Reading ListSource URL: joye.site88.netLanguage: English - Date: 2015-09-04 19:44:09
|
---|
10![A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems Asiacrypt 2003, Taipei Kaoru Kurosawa 1 , Katja Schmidt-Samoa 2 , Tsuyoshi Takagi 2 1 A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems Asiacrypt 2003, Taipei Kaoru Kurosawa 1 , Katja Schmidt-Samoa 2 , Tsuyoshi Takagi 2 1](https://www.pdfsearch.io/img/d94b6b55eedb7588fd233e43964ffccd.jpg) | Add to Reading ListSource URL: conf.ncku.edu.twLanguage: English - Date: 2003-12-17 07:15:58
|
---|