Cryptanalysis |
A New Related Message Attack on RSA / Oded Yacobi ; Yacov Yacobi |
Breaking a Cryptographic Protocol with Pseudoprimes / Daniel Bleichenbacher |
Experimenting with Faults, Lattices and the DSA / David Naccache ; Phong Q. Nguy n ; Michael Tunstall ; Claire Whelan |
Key Establishment |
Securing RSA-KEM via the AES / Jakob Jonsson ; Matthew J.B. Robshaw |
One-Time Verifier-Based Encrypted Key Exchange / Michel Abdalla ; Olivier Chevassut ; David Pointcheval |
Password-Based Authenticated Key Exchange in the Three-Party Setting / Pierre-Alain Fouque |
Optimization |
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods / Werner Schindler |
Symmetric Subgroup Membership Problems / Kristian Gjosteen |
Building Blocks |
Optimizing Robustness While Generating Shared Secret Safe Primes / Emil Ong ; John Kubiatowicz |
Fast Multi-computations with Integer Similarity Strategy / Wu-Chuan Yang ; Dah-Jyh Guan ; Chi-Sung Laih |
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order / Endre Bangerter ; Jan Camenisch ; Ueli Maurer |
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries / Cheng-Kang Chu ; Wen-Guey Tzeng |
RSA Cryptography |
Converse Results to the Wiener Attack on RSA / Ron Steinfeld ; Scott Contini ; Huaxiong Wang ; Josef Pieprzyk |
RSA with Balanced Short Exponents and Its Application to Entity Authentication / Hung-Min Sun ; Cheng-Ta Yang |
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity / Ryotaro Hayashi ; Keisuke Tanaka |
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited / Julien Cathalo ; Jean-Sébastien Coron |
Multivariate Asymmetric Cryptography |
Tractable Rational Map Signature / Lih-Chung Wang ; Yuh-Hua Hu ; Feipei Lai ; Chun-Yen Chou ; Bo-Yin Yang |
Cryptanalysis of the Tractable Rational Map Cryptosystem / Antoine Joux ; Sébastien Kunz-Jacques ; Frédéric Muller ; Pierre-Michel Ricordel |
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems / Christopher Wolf ; Bart Preneel |
Cryptanalysis of HFEv and Internal Perturbation of HFE / Jintai Ding ; Dieter Schmidt |
Signature Schemes |
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible / Louis Granboulan |
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring / Dario Catalano ; Rosario Gennaro |
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme / Wakaha Ogata ; Kaoru Kurosawa ; Swee-Huay Heng |
Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions / Ivan Damgard ; Kasper Dupont |
Identity-Based Cryptography |
Improved Identity-Based Signcryption / Liqun Chen ; John Malone-Lee |
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption / Joonsang Baek ; Reihaneh Safavi-Naini ; Willy Susilo |
CBE from CL-PKE: A Generic Construction and Efficient Schemes / Sattam S. Al-Riyami ; Kenneth G. Paterson |
Best Paper Award |
A Verifiable Random Function with Short Proofs and Keys / Yevgeniy Dodis ; Aleksandr Yampolskiy |
Author Index |
Cryptanalysis |
A New Related Message Attack on RSA / Oded Yacobi ; Yacov Yacobi |
Breaking a Cryptographic Protocol with Pseudoprimes / Daniel Bleichenbacher |
Experimenting with Faults, Lattices and the DSA / David Naccache ; Phong Q. Nguy n ; Michael Tunstall ; Claire Whelan |
Key Establishment |
Securing RSA-KEM via the AES / Jakob Jonsson ; Matthew J.B. Robshaw |