Invited Talks |
Sub-linear Queries Statistical Databases: Privacy with Power / Cynthia Dwork |
Malicious Cryptography: Kleptographic Aspects / Adam Young ; Moti Yung |
Cryptanalysis |
Resistance of SNOW 2.0 Against Algebraic Attacks / Olivier Billet ; Henri Gilbert |
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes / An Braeken ; Christopher Wolf ; Bart Preneel |
Hold Your Sessions: An Attack on Java Session-Id Generation / Zvi Gutterman ; Dahlia Malkhi |
Update on SHA-1 / Vincent Rijmen ; Elisabeth Oswald |
A Fast Correlation Attack on the Shrinking Generator / Bin Zhang ; Hongjun Wu ; Dengguo Feng ; Feng Bao |
Public-Key Encryption |
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption / Dan Boneh ; Jonathan Katz |
A Generic Conversion with Optimal Redundancy / Yang Cui ; Kazukuni Kobara ; Hideki Imai |
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 / Nick Howgrave-Graham ; Joseph H. Silverman ; William Whyte |
Signature Schemes |
Foundations of Group Signatures: The Case of Dynamic Groups / Mihir Bellare ; Haixia Shi ; Chong Zhang |
Time-Selective Convertible Undeniable Signatures / Fabien Laguillaumie ; Damien Vergnaud |
Design Principles |
On Tolerant Cryptographic Constructions / Amir Herzberg |
Password-Based Protocols |
Simple Password-Based Encrypted Key Exchange Protocols / Michel Abdalla ; David Pointcheval |
Hard Bits of the Discrete Log with Applications to Password Authentication / Philip Mackenzie ; Sarvar Patel |
Proofs for Two-Server Password Authentication / Michael Szydlo ; Burton Kaliski |
Design and Analysis of Password-Based Key Derivation Functions / Frances F. Yao ; Yiqun Lisa Yin |
Pairings |
A New Two-Party Identity-Based Authenticated Key Agreement / Noel McCullagh ; Paulo S.L.M. Barreto |
Accumulators from Bilinear Pairings and Applications / Lan Nguyen |
Computing the Tate Pairing / Michael Scott |
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings / Tsz Hon Yuen ; Victor K. Wei |
Efficient and Secure Implementation |
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box / Nele Mentens ; Lejla Batina ; Ingrid Verbauwhede |
CryptoGraphics: Secret Key Cryptography Using Graphics Cards / Debra L. Cook ; John Ioannidis ; Angelos D. Keromytis ; Jake Luck |
Side-Channel Leakage of Masked CMOS Gates / Stefan Mangard ; Thomas Popp ; Berndt M. Gammel |
New Minimal Weight Representations for Left-to-Right Window Methods / James A. Muir ; Douglas R. Stinson |
Author Index |
Invited Talks |
Sub-linear Queries Statistical Databases: Privacy with Power / Cynthia Dwork |
Malicious Cryptography: Kleptographic Aspects / Adam Young ; Moti Yung |
Cryptanalysis |
Resistance of SNOW 2.0 Against Algebraic Attacks / Olivier Billet ; Henri Gilbert |
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes / An Braeken ; Christopher Wolf ; Bart Preneel |