Distributed Systems Security: Foundations |
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin |
Universally Composable Simultaneous Broadcast / Alejandro Hevia |
Signature Schemes Variants |
Relations Among Security Notions for Undeniable Signature Schemes / Kaoru Kurosawa ; Swee-Huay Heng |
Concurrent Blind Signatures Without Random Oracles / Aggelos Kiayias ; Hong-Sheng Zhou |
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions / Fabien Laguillaumie ; Benoit Libert ; Jean-Jacques Quisquater |
Block Ciphers Analysis |
Understanding Two-Round Differentials in AES / Joan Daemen ; Vincent Rijmen |
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b / Jiqiang Lu ; Changhoon Lee ; Jongsung Kim |
Anonymity and E-Commerce |
Constant-Size Dynamic k-TAA / Man Ho Au ; Willy Susilo ; Yi Mu |
On Secure Orders in the Presence of Faults / Amir Herzberg ; Igal Yoffe |
Balancing Accountability and Privacy Using E-Cash / Jan Camenisch ; Susan Hohenberger ; Anna Lysyanskaya |
Public Key Encryption and Key Exchange |
About the Security of MTI/CO and MQV / Sebastien Kunz-Jacques ; David Pointcheval |
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles / David Galindo ; Eike Kiltz |
A New Key Exchange Protocol Based on MQV Assuming Public Computations |
Secret Sharing |
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants / Jaume Marti-Farre ; Carles Padro |
Cheating Immune (2, n)-Threshold Visual Secret Sharing / Roberto Be Prisco ; Alfredo De Santis |
Rational Secret Sharing, Revisited / S. Dov Gordon ; Jonathan Katz |
Symmetric Key Cryptanalysis and Randomness |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 / Alex Biryukov ; Bart Preneel ; Seokhie Hong |
Distinguishing Stream Ciphers with Convolutional Filters / Gilles Van Assche |
On Statistical Testing of Random Numbers Generators / Fida El Haje ; Yuri Golubev ; Pierre-Yvan Liardet ; Yannick Teglia |
Applied Authentication |
Lightweight Email Signatures / Ben Adida ; David Chau ; Ronald L. Rivest |
Shoehorning Security into the EPC Tag Standard / Daniel V. Bailey ; Art Juels |
Proof-Carrying Proxy Certificates / Walid Bagga ; Stefano Crosta ; Refik Molva |
Public Key Related Cryptanalysis |
Cryptanalysis of Rainbow / Olivier Billet ; Henri Gilbert |
An Improved LPN Algorithm / Eric Levieil ; Pierre-Alain Fouque |
Invited Talk |
Theory and Practice of Multiparty Computation / Ivan Damgard |
Author Index |
Distributed Systems Security: Foundations |
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin |
Universally Composable Simultaneous Broadcast / Alejandro Hevia |