Public-Key Cryptanalysis I |
On the Security of RSA Padding / Jean-Sébastien Coron ; David Naccache ; Julien P. Stern |
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization / Aviad Kipnis ; Adi Shamir |
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications / Phong Nguyen ; Jacques Stern |
Invited Lecture |
Information-Theoretic Cryptography / Ueli Maurer |
Secure Communication and Computation |
Information Theoretically Secure Communication in the Limited Storage Space Model / Yonatan Aumann ; Michael O. Rabin |
The All-or-Nothing Nature of Two-Party Secure Computation / Amos Beimel ; Tal Malkin ; Silvio Micali |
Distributed Cryptography |
Adaptive Security for Threshold Cryptosystems / Ran Canetti ; Rosario Gennaro ; Stanislaw Jarecki ; Hugo Krawczyk ; Tal Rabin |
Two Party RSA Key Generation / Niv Gilboa |
Robust Distributed Multiplication without Interaction / Masayuki Abe |
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting / Berry Schoenmakers |
Secret-Key Cryptography |
Truncated Differentials and Skipjack / Lars R. Knudsen ; M.J.B. Robshaw ; David Wagner |
Fast Correlation Attacks Based on Turbo Code Techniques / Thomas Johansson ; Fredrik Jönsson |
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality / Subhamoy Maitra ; Palash Sarkar |
Message Authentication Codes |
UMAC: Fast and Secure Message Authentication / John Black ; Shai Halevi ; Ted Krovetz ; Phillip Rogaway |
Square Hash: Fast Message Authentication via Optimized Universal Hash Functions / Mark Etzel ; Sarvar Patel ; Zulfikar Ramzan |
Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions / Jee Hea An ; Mihir Bellare |
Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier / Oded Goldreich |
Public-Key Cryptanalysis II |
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 |
Weakness in Quaternion Signatures / Don Coppersmith |
Cryptanalysis of "2R" Schemes / Ding-Feng Ye ; Kwok-Yan Lam ; Zong-Duo Dai |
Traitor Tracing / Dan Boneh ; Glenn Durfee ; Nick Howgrave-Graham |
An Efficient Public Key Traitor Tracing Scheme / Matthew Franklin |
Dynamic Traitor Tracing / Amos Fiat ; Tamir Tassa |
Efficient Methods for Integrating Traceability and Broadcast Encryption / Eli Gafni ; Jessica Staddon ; Yiqun Lisa Yin |
Differential Power Analysis |
Towards Sound Approaches to Counteract Power-Analysis Attacks / Paul Kocher ; Joshua Jaffe ; Benjamin Jun ; Suresh Chari ; Charanjit S. Jutla ; Josyula R. Rao ; Pankaj Rohatgi |
Signature Schemes |
Separability and Efficiency for Generic Group Signature Schemes / Jan Camenisch ; Markus Michels |
A Forward-Secure Digital Signature Scheme / Sara K. Miner |
Abuse-Free Optimistic Contract Signing / Juan A. Garay ; Markus Jakobsson ; Philip MacKenzie |
Zero Knowledge |
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK / Amit Sahai ; Salil Vadhan |
On Concurrent Zero-Knowledge with Pre-processing / Giovanni Di Crescenzo ; Rafail Ostrovsky |
Asymmetric Encryption |
On the Security Properties of OAEP as an All-or-Nothing Transform / Victor Boyko |
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization |
Secure Integration of Asymmetric and Symmetric Encryption Schemes / Eiichiro Fujisaki ; Tatsuaki Okamoto |
Electronic Cash |
Auditable, Anonymous Electronic Cash / Tomas Sander ; Amnon Ta-Shma |
Protocols and Broadcasting |
Oblivious Transfer with Adaptive Queries / Moni Naor ; Benny Pinkas |
Compressing Cryptographic Resources / Yuval Ishai |
Coding Constructions for Blacklisting Problems without Computational Assumptions / Ravi Kumar ; Sridhar Rajagopalan |
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes / Radha Poovendran ; John S. Baras |
Author Index |
Public-Key Cryptanalysis I |
On the Security of RSA Padding / Jean-Sébastien Coron ; David Naccache ; Julien P. Stern |
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization / Aviad Kipnis ; Adi Shamir |