Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project
CRYPTO 2008: 
David Wagner (Ed.):
Advances in Cryptology - CRYPTO 2008,
28th Annual International Cryptology Conference,
Santa Barbara, CA, USA,
August 17-21, 2008.
Proceedings.
Preface by David Wagner
Sponsored by the
International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and
Privacy,
Computer Science Department, University of California, Santa Barbara
General Chair
Susan Langford, Hewlett-Packard Company
Program Chair
David Wagner, UC Berkeley
Program Commitee
| Boaz Barak | | Princeton University |
| John Black | | University of Colorado at Boulder |
| Xavier Boyen | | Voltage Security |
| Melissa Chase | | Brown University |
| Jean-Sebastien Coron | | University of Luxembourg |
| Yevgeniy Dodis | | New York University |
| Orr Dunkelman | | KU Leuven |
| Matt Franklin | | UC Davis |
| Craig Gentry | | Stanford University |
| Henri Gilbert | | Orange Labs |
| Kristian Gjosteen | | Norwegian University of Science and Technology |
| Louis Granboulan | | European Aeronautic Defence and Space Company |
| Danny Harnik | | IBM Haifa Research Lab |
| Susan Hohenberger | | Johns Hopkins University |
| Nick Hopper | | University of Minnesota |
| Yuval Ishai | | Technion Institute and UCLA |
| Thomas Johansson | | Lund University |
| Ari Juels | | RSA Laboratories |
| Lars Knudsen | | DTU Mathematics |
| Kristin Lauter | | Microsoft Research |
| Yehuda Lindell | | Bar Ilan University |
| Tal Malkin | | Columbia University |
| Manoj Prabhakaran | | University of Illinois, Urbana-Champaign |
| Zulfikar Ramzan | | Symantec |
| Renato Renner | | ETH Zurich |
| Matt Robshaw | | Orange Labs |
| Alon Rosen | | Herzliya Interdisciplinary Center |
| Amit Sahai | | UCLA |
| Hovav Shacham | | UC San Diego |
| Tom Shrimpton | | Portland State University and University of Lugano |
| Adam Smith | | Pennsylvania State University |
| Serge Vaudenay | | EPFL |
| Brent Waters | | SRI International |
| Lisa Yin | | Independent Consultant |
Advisory Members
| Alfred Menezes (CRYPTO 2007 Program Chair) | | University of Waterloo |
| Shai Halevi (CRYPTO 2009 Program Chair) | | IBM Research |
External Reviewers
Random Oracles
Applications
Public-Key Crypto I
- Dimitar Jetchev, Ramarathnam Venkatesan:
Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys, (ps),
75-92
BibTeX
- Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam:
Improved Bounds on Security Reductions for Discrete Log Based Signatures, (ps), 93-107
BibTeX
- Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky:
Circular-Secure Encryption from Decision Diffie-Hellman, (ps), 108-125
BibTeX
- Brett Hemenway, Rafail Ostrovsky:
Public-Key Locally-Decodable Codes, (ps), 126-143
BibTeX
Hash Functions I
- Helena Handschuh, Bart Preneel:
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms, (ps), 144-161
BibTeX
- Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt:
Cryptanalysis of the GOST Hash Function, (ps), 162-178
BibTeX
- Christophe De Cannière, Christian Rechberger:
Preimages for Reduced SHA-0 and SHA-1, (ps), 179-202
BibTeX
Cryptanalysis I
- Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani:
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme, (ps), 203-220
BibTeX
- Eli Biham, Yaniv Carmeli, Adi Shamir:
>Bug Attacks, (ps), 221-240
BibTeX
Multiparty Computation I
Cryptanalysis II
Public-Key Crypto II
- Cécile Delerablée, David Pointcheval:
Dynamic Threshold Public-Key Encryption, (ps), 317-334
BibTeX
- Alexandra Boldyreva, Serge Fehr, Adam O'Neill:
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles, (ps), 335-359
BibTeX
- Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart:
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles, (ps), 360-378
BibTeX
- Rafail Ostrovsky, William E. Skeith III:
Communication Complexity in Algebraic Two-Party Protocols, (ps), 379-396
BibTeX
Hash Functions II
Privacy
Multiparty Computation II
Zero Knowledge
Oblivious Transfer
Author Index