Diffie-Hellman Based Schemes |
Efficient Construction of (Distributed) Verifiable Random Functions / Yevgeniy Dodis |
An Identity-Based Signature from Gap Diffie-Hellman Groups / Jae Choon Cha ; Jung Hee Cheon |
Threshold Cryptography |
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme / Alexandra Boldyreva |
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack / Philip MacKenzie |
Reduction Proofs |
On the Bit Security of NTRUEncrypt / Mats Näslund ; Igor E. Shparlinski ; William Whyte |
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks / Yodai Watanabe ; Junji Shikata ; Hideki Imai |
Broadcast and Tracing |
Randomness Re-use in Multi-recipient Encryption Schemes / Mihir Bellare ; Jessica Staddon |
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / Nelly Fazio |
Digital Signatures |
The Cramer-Shoup Strong-RSA Signature Scheme Revisited / Marc Fischlin |
Strong Key-Insulated Signature Schemes / Jonathan Katz ; Shouhuai Xu ; Moti Yung |
Specialized Multiparty Cryptography |
A Verifiable Secret Shuffle of Homomorphic Encryptions / Jens Groth |
Round-Optimal Contributory Conference Key Agreement / Colin Boyd ; Juan Manuel González Nieto |
Cryptanalysis I |
Security Analysis of the MORCryptosystem / Christian Tobias |
A Practical Attack on Some Braid Group Based Cryptographic Primitives / Dennis Hofheinz ; Rainer Steinwandt |
Elliptic Curves: Implementation Attacks |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems / Louis Goubin |
Validation of Elliptic Curve Public Keys / Adrian Antipa ; Daniel Brown ; Alfred Menezes ; René Struik ; Scott Vanstone |
Exceptional Procedure Attack on Elliptic Curve Cryptosystems / Tetsuya Izu ; Tsuyoshi Takagi |
Implementation and Hardware Issues |
A Dedicated Sieving Hardware / Martijn Stam ; Willi Geiselmann |
A Fast and Secure Implementation of Sflash / Mehdi-Laurent Akkar ; Nicolas T. Courtois ; Romain Duteuil |
New Public Key Schemes |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes / David Galindo ; Sebastià MartÃn ; Paz Morillo ; Jorge L. Villar |
A Lattice Based Public Key Cryptosystem Using Polynomial Representations / Seong-Hun Paeng ; Bae Eun Jung ; Kil-Chan Ha |
Elliptic Curves: General Issues |
The Security of DSA and ECDSA (Bypassing the Standard Elliptic Curve Certification Scheme) / Serge Vaudenay |
Cryptanalysis II |
Side-Channel Attacks on Textbook RSA and ElGamal Encryption / Ulrich Kuhn |
On the Security of HFE, HFEv- and Quartz / Magnus Daum ; Patrick Felke |
Generic Attacks and the Security of Quartz |
Author Index |
Diffie-Hellman Based Schemes |
Efficient Construction of (Distributed) Verifiable Random Functions / Yevgeniy Dodis |
An Identity-Based Signature from Gap Diffie-Hellman Groups / Jae Choon Cha ; Jung Hee Cheon |
Threshold Cryptography |
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme / Alexandra Boldyreva |
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack / Philip MacKenzie |