XTR and NTRU |
The XTR Pubhc Key System / Arjen K. Lenstra ; Eric R. Verheul |
A Chosen-Ciphertext Attack against NTRU / Eliane Jaulmes ; Antoine Joux |
Privacy for Databases |
Privacy Preserving Data Mining / Yehuda Lindell ; Benny Pinkas |
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing / Arnos Beimel ; Yuval Ishai ; Tal Malkin |
Secure Distributed Computation and Applications |
Parallel Reducibility for Information-Theoretically Secure Computation / Yevgeniy Dodis ; Silvio Micali |
Optimistic Fair Secure Computation / Christian Cachin ; Jan Camenisch |
A Cryptographic Solution to a Game Theoretic Problem / Shai Halevi ; Tal Rahin |
Algebraic Cryptosystems |
Differential Fault Attacks on Elliptic Curve Cryptosystems / Ingrid Bichl ; Bernd Meyer ; Volker Müller |
Quantum Public-Key Cryptosystems / Tatsuaki Okamoto ; Keisuke Tanaka ; Shigenori Uchiyama |
New Public-Key Cryptosystem Using Braid Groups / Ki Hyoung Ko ; Sang Jin Lee ; Jung Hee Cheon ; Jae Woo Han ; Ju-sung Kang ; Choonsik Park |
Message Authentication |
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm / Don Coppersmith ; Lars R. Knudsen ; Chris J. Mitchell |
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions / John Black ; Phillip Rogaway |
L-colhsion Attacks against Randomized MACs / Michael Semanko |
Digital Signatures |
On the Exact Security of Full Domain Hash / Jean-Sébastien Coron |
Timed Commitments / Dan Boneh ; Moni Naor |
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme / Giuseppe Ateniese ; Marc Joye ; Gene Tsudik |
Provably Secure Partially Blind Signatures / Masayuki Abe |
Cryptanalysis |
Weaknesses in the SL2(<$>{\rm IF}_{2^n}<$>) Hashing Scheme / Rainer Steinwandt ; Markus Grassl ; Willi Geiselmann ; Thomas Beth |
Fast Correlation Attacks through Reconstruction of Linear Polynomials / Thomas Johansson ; Fredrik Jönsson |
Traitor Tracing and Broadcast Encryption |
Sequential Traitor Tracing / Reihaneh Safavi-Naini ; Yejing Wang |
Long-Lived Broadcast Encryption / Juan A. Garay ; Jessica Staddon ; Avishai Wool |
Invited Talk |
Taming the Adversary / Martín Abadi |
Symmetrie Encryption |
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search / Anand Desai |
On the Round Security of Symmetrie-Key Cryptographic Primitives / Zulfikar Ramzan ; Leonid Reyzin |
New Paradigms for Constructing Symmetrie Encryption Schemes Secureagainst Chosen-Ciphertext Attack |
To Commit or Not to Commit |
Efficient Non-malleable Commitment Schemes / Marc Fischlin ; Roger Fischlin |
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption / Ivan Damgård ; Jesper Buus Nielsen |
Protocols |
A Note on the Round-Complexity of Concurrent Zero-Knowledge / Alan Rosen |
An Improved Pseudo-random Generator Based on Discrete Log / Rosario Gennaro |
Linking Classical and Quantum Key Agreement: Is There ``Bound Information''? / Nicolas Gisin ; Stefan Wolf |
Stream Ciphers and Boolean Functions |
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers / Muxiang Zhang ; Agnes Chan |
Nonlinearity Bounds and Constructions of Resilient Boolean Functions / Palash Sarkar ; Subhamoy Maitra |
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications / Jürgen Bierbrauer ; Holger Schellwat |
Author Index |
XTR and NTRU |
The XTR Pubhc Key System / Arjen K. Lenstra ; Eric R. Verheul |
A Chosen-Ciphertext Attack against NTRU / Eliane Jaulmes ; Antoine Joux |
Privacy for Databases |
Privacy Preserving Data Mining / Yehuda Lindell ; Benny Pinkas |
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing / Arnos Beimel ; Yuval Ishai ; Tal Malkin |