default search action
EUROCRYPT 2009: Cologne, Germany
- Antoine Joux:
Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings. Lecture Notes in Computer Science 5479, Springer 2009, ISBN 978-3-642-01000-2
Security, Proofs and Models (1)
- Mihir Bellare, Dennis Hofheinz, Scott Yilek:
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. 1-35 - Divesh Aggarwal, Ueli M. Maurer:
Breaking RSA Generically Is Equivalent to Factoring. 36-53 - Vipul Goyal, Amit Sahai:
Resettably Secure Computation. 54-71 - Chi-Jen Lu:
On the Security Loss in Cryptographic Reductions. 72-87
Hash Cryptanalysis
- Praveen Gauravaram, Lars R. Knudsen:
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. 88-105 - Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of MDC-2. 106-120 - Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan:
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. 121-133 - Yu Sasaki, Kazumaro Aoki:
Finding Preimages in Full MD5 Faster Than Exhaustive Search. 134-152
Group and Broadcast Encryption
- Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer:
Asymmetric Group Key Agreement. 153-170 - Craig Gentry, Brent Waters:
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). 171-188 - Olivier Billet, Duong Hieu Phan:
Traitors Collaborating in Public: Pirates 2.0. 189-205
Cryptosystems (1)
- Bhavana Kanukurthi, Leonid Reyzin:
Key Agreement from Close Secrets over Unsecured Channels. 206-223 - Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill:
Order-Preserving Symmetric Encryption. 224-241 - Kan Yasuda:
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. 242-259
Cryptanalysis
- Guilhem Castagnos, Fabien Laguillaumie:
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. 260-277 - Itai Dinur, Adi Shamir:
Cube Attacks on Tweakable Black Box Polynomials. 278-299 - Khaled Ouafi, Serge Vaudenay:
Smashing SQUASH-0. 300-312
Cryptosystems (2)
- Dennis Hofheinz, Eike Kiltz:
Practical Chosen Ciphertext Secure Encryption from Factoring. 313-332 - Susan Hohenberger, Brent Waters:
Realizing Hash-and-Sign Signatures under Standard Assumptions. 333-350 - Jan Camenisch, Nishanth Chandran, Victor Shoup:
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. 351-368
Invited Talk
- Shafi Goldwasser:
Cryptography without (Hardly Any) Secrets ? 369-370
Security, Proofs and Models (2)
- Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton:
Salvaging Merkle-Damgård for Practical Applications. 371-388 - Eike Kiltz, Krzysztof Pietrzak:
On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. 389-406 - Mihir Bellare, Thomas Ristenpart:
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. 407-424 - Jan Camenisch, Aggelos Kiayias, Moti Yung:
On the Portability of Generalized Schnorr Proofs. 425-442
Side Channels
- François-Xavier Standaert, Tal Malkin, Moti Yung:
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. 443-461 - Krzysztof Pietrzak:
A Leakage-Resilient Mode of Operation. 462-482
Curves
- Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang:
ECM on Graphics Cards. 483-501 - Christophe Doche, David R. Kohel, Francesco Sica:
Double-Base Number System for Multi-scalar Multiplications. 502-517 - Steven D. Galbraith, Xibin Lin, Michael Scott:
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. 518-535 - Takakazu Satoh:
Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields. 536-553
Randomness
- Michel Abdalla, Dario Catalano, Dario Fiore:
Verifiable Random Functions from Identity-Based Key Encapsulation. 554-571 - Céline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer:
Optimal Randomness Extraction from a Diffie-Hellman Element. 572-589 - Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung:
A New Randomness Extraction Paradigm for Hybrid Encryption. 590-609
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.