Factoring and Discrete Logarithm |
Factorization of a 512-Bit RSA Modulus / Stefania Cavallar ; Bruce Dodson ; Arjen K. Lenstra ; Walter Lioen ; Peter L. Montgomery ; Brian Murphy ; Herman te Riele ; Karen Aardal ; Jeff Gilchrist ; Gérard Guillerm ; Paul Leyland ; Joël Marchand ; François Morain ; Alec Muffett ; Chris ; Craig Putnam ; Paul Zimmermann |
An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves / Pierrick Gaudry |
Analysis and Optimization of the TWINKLE Factoring Device / Adi Shamir |
Cryptanalysis I: Digital Signatures |
Noisy Polynomial Interpolation and Noisy Chinese Remaindering / Daniel Bleichenbacher ; Phong Q. Nguyen |
A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme / François Grieu |
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1 / Marc Girault ; Jean-François Misarsky |
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme / Jean-Sébastien Coron ; David Naccache |
Invited Talk |
On the Security of 3GPP Networks / Michael Walker |
Private Information Retrieval |
One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval / Eyal Kushilevitz ; Rafail Ostrovsky |
Single Database Private Information Retrieval Implies Oblivious Transfer / Giovanni Di Crescenzo ; Tal Malkin |
Key Management Protocols |
Authenticated Key Exchange Secure against Dictionary Attacks / Mihir Bellare ; David Pointcheval ; Phillip Rogaway |
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman / Victor Boyko ; Philip MacKenzie ; Sarvar Patel |
Fair Encryption of RSA Keys / Guillaume Poupard ; Jacques Stern |
Threshold Cryptography and Digital Signatures |
Computing Inverses over a Shared Secret Modulus / Dario Catalano ; Rosario Gennaro ; Shai Halevi |
Practical Threshold Signatures / Victor Shoup |
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures / Stanisław Jarecki ; Anna Lysyanskaya |
Confirmer Signature Schemes Secure against Adaptive Adversaries / Jan Camenisch ; Markus Michels |
Public-Key Encryption |
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements / Alexandra Boldyreva ; Silvio Micali |
Using Hash Functions as a Hedge against Chosen Ciphertext Attack |
Quantum Cryptography |
Security Aspects of Practical Quantum Cryptography / Gilles Brassard ; Norbert Lütkenhaus ; Tal Mor ; Barry C. Sanders |
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation / Paul Dumais ; Dominic Mayers ; Louis Salvail |
Multi-party Computation and Information Theory |
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme / Ronald Cramer ; Ivan Damgård ; Ueli Maurer |
Minimal-Latency Secure Function Evaluation / Donald Beaver |
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free / Stefan Wolf |
Cryptanalysis II: Public-Key Encryption |
New Attacks on PKCS#1 v1.5 Encryption / Marc Joye ; Pascal Paillier |
A NICE Cryptanalysis / Éliane Jaulmes ; Antoine Joux |
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations / Nicolas Courtois ; Alexander Klimov ; Jacques Patarin |
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R) / Eli Biham |
Colossus and the German Lorenz Cipher - Code Breaking in WW II / Anthony E Sale |
Zero-Knowledge |
Efficient Concurrent Zero-Knowledge in the Auxiliary String Model |
Efficient Proofs that a Committed Number Lies in an Interval / Fabrice Boudot |
Symmetric Cryptography |
A Composition Theorem for Universal One-Way Hash Functions |
Exposure-Resilient Functions and All-Or-Nothing Transforms / Ran Canetti ; Yevgeniy Dodis ; Amit Sahai |
The Sum of PRPs Is a Secure PRF / Stefan Lucks |
Boolean Functions and Hardware |
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties / Palash Sarkar ; Subhamoy Maitra |
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions / Anne Canteaut ; Claude Carlet ; Pascale Charpin ; Caroline Fontaine |
Cox-Rower Architecture for Fast Parallel Montgomery Multiplication / Shinichi Kawamura ; Masanobu Koike ; Fumihiko Sano ; Atsushi Shimbo |
Voting Schemes |
Efficient Receipt-Free Voting Based on Homomorphic Encryption / Martin Hirt ; Kazue Sako |
How to Break a Practical MIX and Design a New One / Yvo Desmedt ; Kaoru Kurosawa |
Cryptanalysis III: Stream Ciphers and Block Ciphers |
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 / Michaël Trabbia |
Advanced Slide Attacks / Alex Biryukov ; David Wagner |
Author Index |
Factoring and Discrete Logarithm |
Factorization of a 512-Bit RSA Modulus / Stefania Cavallar ; Bruce Dodson ; Arjen K. Lenstra ; Walter Lioen ; Peter L. Montgomery ; Brian Murphy ; Herman te Riele ; Karen Aardal ; Jeff Gilchrist ; Gérard Guillerm ; Paul Leyland ; Joël Marchand ; François Morain ; Alec Muffett ; Chris ; Craig Putnam ; Paul Zimmermann |
An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves / Pierrick Gaudry |