Cryptanalysis I |
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups / Rosario Gennaro ; Daniele Micciancio |
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups / Sang Jin Lee ; Eonkyung Lee |
Extending the GHS Weil Descent Attack / Steven D. Galbraith ; Florian Hess ; Nigel P. Smart |
Public-Key Encryption |
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption / Ronald Cramer ; Victor Shoup |
Key-Insulated Public Key Cryptosystems / Yevgeniy Dodis ; Jonathan Katz ; Shouhuai Xu ; Moti Yung |
On the Security of Joint Signature and Encryption / Jee Hea An ; Tal Rabin |
Invited Talk |
AES and the Wide Trail Design Strategy / Joan Daemen ; Vincent Rijmen |
Information Theory & New Models |
Indistinguishability of Random Systems / Ueli Maurer |
How to Fool an Unbounded Adversary with a Short Key / Alexander Russell ; Hong Wang |
Cryptography in an Unbounded Computational Model / David P. Woodruff ; Marten van Dijk |
Implementational Analysis |
Performance Analysis and Parallel Implementation of Dedicated Hash Functions / Junko Nakajima ; Mitsuru Matsui |
Fault Injection and a Timing Channel on an Analysis Technique / John A. Clark ; Jeremy L. Jacob |
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms / Young-Ho Park ; Sangtae Jeong ; Jongin Lim |
Stream Ciphers |
Fast Correlation Attacks: An Algorithmic Point of View / Philippe Chose ; Antoine Joux ; Michel Mitton |
BDD-Based Cryptanalysis of Keystream Generators / Matthias Krause |
Linear Cryptanalysis of Bluetooth Stream Cipher / Jovan Dj. Golić ; Vittorio Bagini ; Guglielmo Morgari |
Digital Signatures I |
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups / Ivan Damgård ; Maciej Koprowski |
Optimal Security Proofs for PSS and Other Signature Schemes / Jean-Sébastien Coron |
Cryptanalysis II |
Cryptanalysis of SFLASH / Henri Gilbert ; Marine Minier |
Cryptanalysis of the Revised NTRU Signature Scheme / Craig Gentry ; Mike Szydlo |
Key Exchange |
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions / Emmanuel Bresson ; Olivier Chevassut ; David Pointcheval |
Universally Composable Notions of Key Exchange and Secure Channels / Ran Canetti ; Hugo Krawczyk |
On Deniability in Quantum Key Exchange / Donald Beaver |
Modes of Operation |
A Practice-Oriented Treatment of Pseudorandom Number Generators / Anand Desai ; Alejandro Hevia ; Yiqun Lisa Yin |
A Block-Cipher Mode of Operation for Parallelizable Message Authentication / John Black ; Phillip Rogaway |
Rethinking PKI: What's Trust Got to Do with It? / Stephen Kent |
Digital Signatures II |
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods / Tal Malkin ; Sara Miner |
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security / Michel Abdalla ; Mihir Bellare ; Chanathip Namprempre |
Security Notions for Unconditionally Secure Signature Schemes / Junji Shikata ; Goichiro Hanaoka ; Yuliang Zheng ; Hideki Imai |
Traitor Tracking & Id-Based Encryption |
Traitor Tracing with Constant Transmission Rate / Aggelos Kiayias |
Toward Hierarchical Identity-Based Encryption / Jeremy Horwitz ; Ben Lynn |
Multiparty and Multicast |
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch / Matthias Fitzi ; Nicolas Gisin ; Oliver von Rotz |
Perfectly Secure Message Transmission Revisited / Yvo Desmedt ; Yongge Wang |
Symmetric Cryptology |
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis / Anne Canteaut ; Marion Videau |
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS / Serge Vaudenay |
Author Index |
Cryptanalysis I |
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups / Rosario Gennaro ; Daniele Micciancio |
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups / Sang Jin Lee ; Eonkyung Lee |
Extending the GHS Weil Descent Attack / Steven D. Galbraith ; Florian Hess ; Nigel P. Smart |
Public-Key Encryption |
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption / Ronald Cramer ; Victor Shoup |