Lattice Based Cryptography |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo |
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski |
The Modular Inversion Hidden Number Problem / Dan Boneh ; Shai Halevi ; Nick Howgrave-Graham |
Human Identification |
Secure Human Identification Protocols / Nicholas J. Hopper ; Manuel Blum |
Invited Talk |
Unbelievable Security (Matching AES Security Using Public Key Systems) / Arjen K. Lenstra |
Practical Public Key Cryptography |
A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4 / Siguna Müller |
Computation of Discrete Logarithms in {op F}_{{2}^{607}}cEmmanuel Thomé |
Speeding Up XTR / Martijn Stam |
An Efficient Implementation of Braid Groups / Jae Choon Cha ; Ki Hyoung Ko ; Sang Jin Lee ; Jae Woo Han ; Jung Hee Cheon |
Cryptography Based on Coding Theory |
How to Achieve a McEliece-Based Digital Signature Scheme / Nicolas T. Courtois ; Matthieu Finiasz ; Nicolas Sendrier |
Efficient Traitor Tracing Algorithms Using List Decoding / Alice Silverberg ; Jessica Staddon ; Judy L. Walker |
Block Ciphers |
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis / Makoto Sugita ; Kazukuni Kobara ; Hideki Imai |
Known-IV Attacks on Triple Modes of Operation of Block Ciphers / Deukjo Hong ; Jaechul Sung ; Seokhie Hong ; Wonil Lee ; Sangjin Lee ; Jongin Lim ; Okyeon Yi |
Generic Attacks on Feistel Schemes / Jacques Patarin |
A Compact Rijndael Hardware Architecture with S-Box Optimization / Akashi Satoh ; Sumio Morioka ; Kohji Takano ; Seiji Munetoh |
Provable Security |
Provable Security of KASUMI and 3GPP Encryption Mode f8 / Ju-Sung Kang ; Sang-Uk Shin ; Dowon Hong |
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices / Duncan S. Wong ; Agnes H. Chan |
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case / Emmanuel Bresson ; Olivier Chevassut ; David Pointcheval |
Threshold Cryptography |
Fully Distributed Threshold RSA under Standard Assumptions / Pierre-Alain Fouque |
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes / Anna Lysyanskaya ; Chris Peikert |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks |
Two-Party Protocols |
Oblivious Polynomial Evaluation and Oblivious Neural Learning / Yan-Cheng Chang ; Chi-Jen Lu |
Mutually Independent Commitments / Moses Liskov ; Silvio Micali ; Leonid Reyzin ; Adam Smith |
Zero Knowledge |
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank |
Responsive Round Complexity and Concurrent Zero-Knowledge / Tzafrir Cohen ; Joe Kilian ; Erez Petrank |
Cryptographic Building Blocks |
Practical Construction and Analysis of Pseudo-Randomness Primitives / Johan Hastad ; Mats Näslund |
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions / Yuriy Tarannikov ; Peter Korolev ; Anton Botev |
Elliptic Curve Cryptography |
An Extension of KedlayaÆs Point-Counting Algorithm to Superelliptic Curves / Pierrick Gaudry ; Nicolas Gürel |
Supersingular Curves in Cryptography / Steven D. Galbraith |
Short Signatures from the Weil Pairing / Ben Lynn ; Hovav Shacham |
Self-Blindable Credential Certificates from the Weil Pairing / Eric R. Verheul |
Anonymity |
How to Leak a Secret / Ronald L. Rivest ; Adi Shamir ; Yael Tauman |
Key-Privacy in Public-Key Encryption / Mihir Bellare ; Alexandra Boldyreva ; Anand Desai |
Provably Secure Fair Blind Signatures with Tight Revocation / Masayuki Abe ; Miyako Ohkubo |
tAuthor Index |
Lattice Based Cryptography |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo |
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski |