{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:33Z","timestamp":1750220913240,"version":"3.41.0"},"reference-count":8,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T00:00:00Z","timestamp":1584662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["Grant Nos. 61872236 and 61572192"],"award-info":[{"award-number":["Grant Nos. 61872236 and 61572192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Ministry of Sci and Tech R.O.C.","award":["Grant 108-2221-E-001-008"],"award-info":[{"award-number":["Grant 108-2221-E-001-008"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2020,3,20]]},"abstract":"<jats:p>Members of the International Association for Cryptologic Research explore regional work and collaboration activities.<\/jats:p>","DOI":"10.1145\/3378428","type":"journal-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T15:06:50Z","timestamp":1584716810000},"page":"76-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Advances in security research in the Asiacrypt region"],"prefix":"10.1145","volume":"63","author":[{"given":"Rapha\u00ebl CW","family":"Phan","sequence":"first","affiliation":[{"name":"Monash University, Malaysia"}]},{"given":"Masayuki","family":"Abe","sequence":"additional","affiliation":[{"name":"NTT, Japan"}]},{"given":"Lynn","family":"Batten","sequence":"additional","affiliation":[{"name":"Deakin University, Australia"}]},{"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[{"name":"SNU, Korea"}]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[{"name":"QUT, Australia"}]},{"given":"Steven","family":"Galbraith","sequence":"additional","affiliation":[{"name":"University of Auckland, New Zealand"}]},{"given":"Jian","family":"Guo","sequence":"additional","affiliation":[{"name":"NTU, Singapore"}]},{"given":"Lucas","family":"Hui","sequence":"additional","affiliation":[{"name":"ASTRI, Hong Kong"}]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Korea"}]},{"given":"Xuejia","family":"Lai","sequence":"additional","affiliation":[{"name":"SJTU, China"}]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea University, Korea"}]},{"given":"Mitsuru","family":"Matsui","sequence":"additional","affiliation":[{"name":"Mitsubishi Electric, Japan"}]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[{"name":"YNU, Japan"}]},{"given":"Shiho","family":"Moriai","sequence":"additional","affiliation":[{"name":"NICT, Japan"}]},{"given":"Phong","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Tokyo, Japan"}]},{"given":"Dingyi","family":"Pei","sequence":"additional","affiliation":[{"name":"Guangzhou University, China"}]},{"given":"Duong Hieu","family":"Phan","sequence":"additional","affiliation":[{"name":"University of Limoges, France"}]},{"given":"Josef","family":"Pieprzyk","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Australia"}]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[{"name":"NTU, Singapore"}]},{"given":"Hank","family":"Wolfe","sequence":"additional","affiliation":[{"name":"University of Otago, New Zealand"}]},{"given":"Duncan","family":"Wong","sequence":"additional","affiliation":[{"name":"CryptoBLK, Hong Kong"}]},{"given":"Tzong-Chen","family":"Wu","sequence":"additional","affiliation":[{"name":"NTUST, Taiwan"}]},{"given":"Bo-Yin","family":"Yang","sequence":"additional","affiliation":[{"name":"Academia Sinica, Taiwan"}]},{"given":"Siu-Ming","family":"Yiu","sequence":"additional","affiliation":[{"name":"HKU, Hong Kong"}]},{"given":"Yu","family":"Yu","sequence":"additional","affiliation":[{"name":"SJTU, China"}]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[{"name":"SUTD, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"volume-title":"Proceedings of 1990 Crypto, 2--21","author":"Biham E.","unstructured":"Biham , E. , Shamir , A. Differential cryptanalysis of DES-like cryptosystem . In Proceedings of 1990 Crypto, 2--21 . Biham, E., Shamir, A. Differential cryptanalysis of DES-like cryptosystem. In Proceedings of 1990 Crypto, 2--21.","key":"e_1_2_1_1_1"},{"volume-title":"Proceedings of 2002 Asiacrypt, 267--287","author":"Courtois N.","unstructured":"Courtois , N. and Pieprzyk , J . Cryptanalysis of block ciphers with overdefined systems of equations . In Proceedings of 2002 Asiacrypt, 267--287 . Courtois, N. and Pieprzyk, J. Cryptanalysis of block ciphers with overdefined systems of equations. In Proceedings of 2002 Asiacrypt, 267--287.","key":"e_1_2_1_2_1"},{"volume-title":"Proceedings of 1999 Crypto, 537--554","author":"Fujisaki E.","unstructured":"Fujisaki , E. and Okamoto , T . Secure integration of asymmetric and symmetric encryption schemes . In Proceedings of 1999 Crypto, 537--554 . Fujisaki, E. and Okamoto, T. Secure integration of asymmetric and symmetric encryption schemes. In Proceedings of 1999 Crypto, 537--554.","key":"e_1_2_1_3_1"},{"volume-title":"Proceedings of 1993 Eurocrypt, 386--397","author":"Matsui M.","unstructured":"Matsui , M. Linear cryptanalysis method for DES cipher . In Proceedings of 1993 Eurocrypt, 386--397 . Matsui, M. Linear cryptanalysis method for DES cipher. In Proceedings of 1993 Eurocrypt, 386--397.","key":"e_1_2_1_4_1"},{"volume-title":"Proceedings of 2002 Asiacrypt, 574--576","author":"Matsumoto T.","unstructured":"Matsumoto , T. Gummy and conductive silicone rubber fingers . In Proceedings of 2002 Asiacrypt, 574--576 . Matsumoto, T. Gummy and conductive silicone rubber fingers. In Proceedings of 2002 Asiacrypt, 574--576.","key":"e_1_2_1_5_1"},{"volume-title":"Proceedings of 2005 Crypto, 17--36","author":"Wang X.","unstructured":"Wang , X. , Yin , YL , and Yu , H . Finding collisions in the full SHA-1 . In Proceedings of 2005 Crypto, 17--36 . Wang, X., Yin, YL, and Yu, H. Finding collisions in the full SHA-1. In Proceedings of 2005 Crypto, 17--36.","key":"e_1_2_1_6_1"},{"volume-title":"Proceedings of 2005 Eurocrypt, 19--35","author":"Wang X.","unstructured":"Wang , X. and Yu , H . How to break MD5 and other hash functions . In Proceedings of 2005 Eurocrypt, 19--35 . Wang, X. and Yu, H. How to break MD5 and other hash functions. In Proceedings of 2005 Eurocrypt, 19--35.","key":"e_1_2_1_7_1"},{"volume-title":"Proceedings of 1997 Crypto, 165--179","author":"Zheng Y.","unstructured":"Zheng , Y. Digital signcryption or how to Achieve cost (signature and encryption)&lt;&lt;cost(signature) + cost(encryption) . In Proceedings of 1997 Crypto, 165--179 . Zheng, Y. Digital signcryption or how to Achieve cost (signature and encryption)&lt;&lt;cost(signature) + cost(encryption). In Proceedings of 1997 Crypto, 165--179.","key":"e_1_2_1_8_1"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378428","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,20]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,3,20]]}},"alternative-id":["10.1145\/3378428"],"URL":"https:\/\/doi.org\/10.1145\/3378428","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2020,3,20]]},"assertion":[{"value":"2020-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}