Note: Submission 107 and 162 will be merged.
012 |
Title |
The XL-algorithm and a Conjecture from Commutative Algebra |
Authors |
Claus Diem | |
Affiliations |
Institute for Experimental Mathematics, University of Essen, Germany | |
019 |
Title |
Colluding Attacks to an Untraceable Fair Network Payment Protocol and Two Signature Exchange |
Authors |
Feng Bao | |
Affiliations |
Institute for Infocomm Research | |
025 |
Title |
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions |
Authors |
Palash Sarkar | |
Affiliations |
Indian Statistical Institute | |
044 |
Title |
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding |
Authors |
Duong Hieu Phan and David Pointcheval | |
Affiliations |
ENS and CNRS-ENS | |
055 |
Title |
Privacy in Non-Private Environments |
Authors |
M. Blaeser, A. Jakoby, M. Liskiewicz and B. Manthey | |
Affiliations |
ETH Zuerich, University of Luebeck, University of Luebeck and University of Luebeck | |
056 |
Title |
Time-Memory Trade-Off Attacks on Multiplications and $T$-functions |
Authors |
Joydip Mitra and Palash Sarkar | |
Affiliations |
Management Development Institute and Indian Statistical Institute | |
058 |
Title |
Generic Homomorphic Undeniable Signatures |
Authors |
Jean Monnerat and Serge Vaudenay | |
Affiliations |
EPFL | |
060 |
Title |
The MD2 Hash Function is Not One-Way |
Authors |
Frédéric Muller | |
Affiliations |
DCSSI Crypto Lab | |
065 |
Title |
How Far Can We Go Beyond Linear Cryptanalysis? |
Authors |
Thomas Baignères, Pascal Junod and Serge Vaudenay | |
Affiliations |
EPFL | |
067 |
Title |
Strong Conditional Oblivious Transfer and Computing on Intervals |
Authors |
Ian F. Blake and Vladimir Kolesnikov | |
Affiliations |
Dept. Elec. and Comp. Eng, University of Toronto and Dept. Comp. Sci., University of Toronto | |
068 |
Title |
Cryptanalysis of Bluetooth Keystream Generator Two-level E0 |
Authors |
Yi Lu and Serge Vaudenay | |
Affiliations |
EPFL | |
071 |
Title |
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC |
Authors |
Phillip Rogaway | |
Affiliations |
University of California at Davis and Chiang Mai University | |
072 |
Title |
New Approaches to Password Authenticated Key Exchange based on RSA |
Authors |
Muxiang Zhang | |
Affiliations |
Verizon Laboratories | |
076 |
Title |
Sieving Using Bucket Sort |
Authors |
Kazumaro Aoki and Hiroki Ueda | |
Affiliations |
NTT and NTT | |
086 |
Title |
Asynchronous Proactive Cryptosystems without Agreement |
Authors |
Bartosz Przydatek and Reto Strobl | |
Affiliations |
ETHZ and IBM Research | |
088 |
Title |
Right-Invariance: A Property for Probabilistic Analysis of Cryptography based on Infinite Groups |
Authors |
Eonkyung Lee | |
Affiliations |
Sejong University, Korea | |
096 |
Title |
On Feistel Ciphers using Optimal Diffusion Mappings across Multiple Rounds |
Authors |
Taizo Shirai and Bart Preneel | |
Affiliations |
Sony Corporation and Katholieke Universiteit Leuven | |
101 |
Title |
k-Times Anonymous Authentication |
Authors |
Isamu Teranisi, Jun Furukawa and Kazue Sako | |
Affiliations |
NEC | |
105 |
Title |
Improved Setup Assumptions for 3-round Resettable Zero Knowledge |
Authors |
Giovanni Di Crescenzo, Giuseppe Persiano and Ivan Visconti | |
Affiliations |
Telcordia Technologies, Dipartimento di Informatica ed Appl. Universita' di Salerno and ENS | |
106 |
Title |
On the Security of MOR Public Key Cryptosystem |
Authors |
In-sok Lee, Nam-seok Kwak, Woo-hwan Kim, Yoo-jin Baek and Sangil Nahm and Daesung Kwon | |
Affiliations |
SNU, SNU, SNU, Samsung Co., Purdue Univ. and NSRI | |
107 |
Title |
Comparison of XL and Groener basis algorithms over Finite Fields |
Authors |
Gwenole Ars and Jean-Charles Faugere | |
Affiliations |
IRMAR, university of Rennes and CALFOR, LIP6, university of Paris 6 | |
113 |
Title |
The Davies-Murphy Power Attack |
Authors |
Sébastien Kunz-Jacques, Frédéric Muller and Frédéric Valette | |
Affiliations |
DCSSI Crypto Lab, DCSSI Crypto Lab and DCSSI Crypto Lab | |
114 |
Title |
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices |
Authors |
Rosario Gennaro, Darren Leigh, Ravi Sundaram and William Yerazunis | |
Affiliations |
IBM Research, Mitsubishi Research, Northeastern University and Mitsubishi Research | |
116 |
Title |
Higher Order Universal One-Way Hash Functions |
Authors |
Deukjo Hong, Bart Preneel and Sangjin Lee | |
Affiliations |
Korea University CIST, ESAT-COSIC Katholieke Universiteit Leuven and Korea University CIST | |
132 |
Title |
On provably secure time-stamping schemes |
Authors |
Ahto Buldas and Märt Saarepera | |
Affiliations |
Tartu University and Independent | |
144 |
Title |
On the Generalized Linear Equivalence of Functions over Finite Fields |
Authors |
Luca Breveglieri, Alessandra Cherubini and Marco Macchetti | |
Affiliations |
Politecnico di Milano, Politecnico di Milano and Politecnico di Milano | |
150 |
Title |
Eliminating Random Permutation Oracles in the Even-Mansour Cipher |
Authors |
Craig Gentry and Zulfikar Ramzan | |
Affiliations |
DoCoMo Communications Laboratory, USA | |
155 |
Title |
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice |
Authors |
Aggelos Kiayias and Moti Yung | |
Affiliations |
University of Connecticut and Columbia University | |
162 |
Title |
XL Algorithm and Groebner Bases Algorithms |
Authors |
Makoto Sugita, Mitsuru Kawazoe and Hideki Imai | |
Affiliations |
Information-technology Promotion Agency (Japan), Osaka Prefecture University and University of Tokyo | |
165 |
Title |
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size against Self-Defensive Pirates |
Authors |
Tatsuyuki Matsushita and Hideki Imai | |
Affiliations |
TOSHIBA Corporation and The University of Tokyo | |
179 |
Title |
Secret Handshakes from CA-Oblivious Encryption |
Authors |
Claude Castelluccia, Stanislaw Jarecki and Gene Tsudik | |
Affiliations |
UC Irvine | |
198 |
Title |
Towards Plaintext-Aware Public-Key Encryption without Random Oracles |
Authors |
Mihir Bellare and Adriana Palacio | |
Affiliations |
University of California, San Diego and University of California, San Diego | |
201 |
Title |
Practical Two-Party Computation based on the Conditional Gate |
Authors |
Berry Schoenmakers and Pim Tuyls | |
Affiliations |
TU Eindhoven and Philips Research Labs | |
205 |
Title |
Constant-Round Authenticated Group Key Exchange for Dynamic Groups |
Authors |
Hyun Jeong Kim, Su Mi Lee and Dong Hoon Lee | |
Affiliations |
Korea Univers, CIST | |
206 |
Title |
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes |
Authors |
Ron Steinfeld, Huaxiong Wang and Josef Pieprzyk | |
Affiliations |
Macquarie University, Macquarie University and Macquarie University | |
220 |
Title |
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings |
Authors |
Lan Nguyen and Rei Safavi-Naini | |
Affiliations |
University of Wollongong and University of Wollongong |