Asiacrypt

Asiacrypt

Asiacrypt (also ASIACRYPT) is an important international conference for cryptography research. The full name of the conference is currently International Conference on the Theory and Application of Cryptology and Information Security, though this has varied over time. Asiacrypt is a conference sponsored by the International Association for Cryptologic Research (IACR) since 2000, and is one of its three flagship conferences. However, Asiacrypt is considered slightly less prestigious than CRYPTO or EUROCRYPT,fact|date=August 2008 although it has been gaining reputation.fact|date=August 2008 Asiacrypt is now held annually in November or December at various locations throughout eastern Asia and Australia.

Initially, the Asiacrypt conferences were called AUSCRYPT, as the first one was held in Sydney, Australia in 1990, and only later did the community decide that the conference should be held in locations throughout Asia. The first conference to be called "Asiacrypt" was held in 1991 in Fujiyoshida, Japan.

Conference and proceedings information by year

* 1990: January 8-11, Sydney, Australia, Jennifer Seberry and Josef Pieprzyk, eds. (called AUSCRYPT 1990; ISBN 3-540-53000-2)
* 1991: November 11-14, Fujiyoshida, Japan, Hideki Imai, Ronald Rivest, Tsutomu Matsumoto, eds. (ISBN 3-540-57332-1)
* 1992: December 13-16, Gold Coast, Queensland, Australia, Jennifer Seberry and Yuliang Zheng, eds. (called AUSCRYPT 1992; ISBN 3-540-57220-1)
* 1994: November 28-December 1, Wollongong, Australia, Josef Pieprzyk, Reihaneh Safavi-Naini, eds. (called ASIACRYPT 1994, ISBN 3-540-59339-X)
* 1996: November 3-7, Kyongju, Korea, Kwangjo Kim, Tsutomu Matsumoto, eds. (ISBN 3-540-61872-4)
* 1998: October 18-22, Beijing, China, Kazuo Ohta, Dingyi Pei, eds. (ISBN 3-540-65109-8)
* 1999: November 14-18, Singapore, Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing, eds. (ISBN 3-540-66666-4)
* 2000: December 3-7, Kyoto, Japan, Tatsuaki Okamoto, ed. (ISBN 3-540-41404-5)
* 2001: December 9-13, Gold Coast, Queensland, Australia, Colin Boyd, ed. (ISBN 3-540-42987-5)
* 2002: December 1-5, Queenstown, New Zealand, Yuliang Zheng, ed. (ISBN 3-540-00171-9)
* 2003: November 30-December 4, Taipei, Taiwan, Chi-Sung Laih, ed. (ISBN 3-540-20592-6)
* 2004: December 5-9, Jeju Island, Korea, Pil Joong Lee, ed. (ISBN 3-540-23975-8)
* 2005: December 4-8, Chennai, India, Bimal Roy, ed. (ISBN 3-540-30684-6)
* 2006: December 3-7, Shanghai, China, Xuejia Lai, Kefei Chen, eds. (ISBN 3-540-49475-8)
* 2007: December 2-6, Kuching, Malaysia, Kaoru Kurosawa, ed. (planned)

See also

* Crypto
* Eurocrypt
* List of cryptology conferences
* IACR

External links

* [http://www.informatik.uni-trier.de/~ley/db/conf/asiacrypt/index.html Asiacrypt/Auscrypt bibliography from 1990]
* [http://www.iacr.org/conferences/ IACR conferences page; contains links to Asiacrypt homepages from 2000]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • LOKI — In cryptography, LOKI89 and LOKI91 are block ciphers designed as possible replacements for the Data Encryption Standard (DES). The ciphers were developed based on a body of work analysing DES, and are very similar to DES in structure. The LOKI… …   Wikipedia

  • LOKI89/91 — Résumé Concepteur(s) Lawrie Brown, Josef Pieprzyk et Jennifer Seberry Première publication 1990 Dérivé de Data Encryption Standard Chiffrement(s) basé(s) sur cet algorithme LOKI97 …   Wikipédia en Français

  • LOKI91 — LOKI89/91 LOKI89/91 Résumé Concepteur(s) Lawrie Brown …   Wikipédia en Français

  • LOKI (cryptographie) — LOKI89/91 LOKI89/91 Résumé Concepteur(s) Lawrie Brown …   Wikipédia en Français

  • XSL attack — In cryptography, the XSL attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to… …   Wikipedia

  • Boomerang attack — In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was published in 1999 by David Wagner, who used it to break the COCONUT98 cipher.The boomerang attack has… …   Wikipedia

  • List of computer science conferences — This is a list of academic conferences in computer science. Most of these academic conferences are annual or bi annual events.The order with which the conferences are listed in their respective fields corresponds to a rough and non authoritative… …   Wikipedia

  • Eurocrypt — (or EUROCRYPT) is an important conference for cryptography research. The full name of the conference is currently the Annual International Conference on the Theory and Applications of Cryptographic Techniques, but this has not always been its… …   Wikipedia

  • Ring signature — In cryptography, a ring signature is a type of digital signature that can be performed by any member of a group of users that each have keys. Therefore, a message signed with a ring signature is endorsed by someone in a particular group of people …   Wikipedia

  • Cryptology Research Society of India — The logo of CRSI. Cryptology Research Society of India (CRSI) is a non profit scientific organization that supports research in cryptography and security related fields in India …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”