Chosen-Ciphertext Security without Redundancy / Duong Hieu Phan ; David PointchevalPublic Key Cryptography I: |
Some RSA-Based Encryption Schemes with Tight Security Reduction / Kaoru Kurosawa ; Tsuyoshi Takagi |
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications / Emmanuel Bresson ; Dario Catalano |
Factoring Estimates for a 1024-Bit RSA Modulus / Arjen Lenstra ; Eran Tromer ; Adi Shamir ; Wil Kortsmit ; Bruce Dodson ; James Hughes ; Paul LeylandNumber Theory I: |
Index Calculus Attack for Hyperelliptic Curves of Small Genus / Nicolas Theriault |
Efficient Implementations |
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves / Pradeep Kumar Mishra ; Palash Sarkar |
Key Management and Protocols / Iwan Duursma ; Hyang-Sook Lee ; David R. Kohel |
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy / Miodrag J. Mihaljevic |
Leakage-Resilient Authenticated Key Establishment Protocols / SeongHan Shin ; Kazukuni Kobara ; Hideki Imai |
Untraceable Fair Network Payment Protocols with Off-Line TTP / Chih-Hung Wang |
Hash Functions |
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking / Dwaine Clarke ; Srinivas Devadas ; Marten van Dijk ; Blaise Gassend ; G. Edward Suh |
New Parallel Domain Extenders for UOWHF / Wonil Lee ; Donghoon Chang ; Sangjin Lee ; Soohak Sung ; Mridul Nandi |
Cryptanalysis of 3-Pass HAVAL / Bart Van Rompay ; Alex Biryukov ; Bart Preneel ; Joos Vandewalle |
Group Signatures |
Efficient Group Signatures without Trapdoors / Giuseppe Ateniese ; Breno de Medeiros |
Accumulating Composites and Improved Group Signing / Gene Tsudik ; Shouhuai Xu |
Almost Uniform Density of Power Residues and the Provable Security of ESIGN / Tatsuaki Okamoto ; Jacques Stern |
Rotations and Translations of Number Field Sieve Polynomials / Jason E. GowerNumber Theory II: |
On Class Group Computations Using the Number Field Sieve / Mark L. Bauer ; Safuat Hamdy |
Invited Talk |
The Secret and Beauty of Ancient Chinese Padlocks / Hong-Sen Yan ; Hsing-Hui Huang |
Block Ciphers |
A Traceable Block Cipher / Olivier Billet ; Henri Gilbert |
A New Attack against Khazad / Frédéric Muller |
Broadcast and Multicast |
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / Chong Hee Kim ; Yong Ho Hwang ; Pil Joong Lee |
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes / Nuttapong Attrapadung |
Foundations and Complexity Theory |
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption / Jean-Sebastien Coron ; David Naccache |
On Diophantine Complexity and Statistical Zero-Knowledge Arguments / Helger Lipmaa |
Verifiable Homomorphic Oblivious Transfer and Private Equality Test |
Generalized Powering Functions and Their Application to Digital Signatures / Hisayoshi Sato ; Satoru Tezuka ; Kazuo TakaragiPublic Key Cryptography II: |
Certificateless Public Key Cryptography / Sattam S. Al-Riyami ; Kenneth G. Paterson |
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems / Katja Schmidt-Samoa |
The Insecurity of Esign in Practical Implementations / Pierre-Alain Fouque ; Nick Howgrave-Graham ; Gwenaelle Martinet ; Guillaume Poupard |
Digital Signature |
Efficient One-Time Proxy Signatures / Huaxiong Wang ; Josef Pieprzyk |
Universal Designated-Verifier Signatures / Ron Steinfeld ; Laurence Bull |
Author Index |
Chosen-Ciphertext Security without Redundancy / Duong Hieu Phan ; David PointchevalPublic Key Cryptography I: |
Some RSA-Based Encryption Schemes with Tight Security Reduction / Kaoru Kurosawa ; Tsuyoshi Takagi |
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications / Emmanuel Bresson ; Dario Catalano |