Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of pkc 2007
Preface and frontmatter
Page
Title
1-15
Full-Domain Subgroup Hiding and Constant-Size Group Signatures
16-30
A Direct Anonymous Attestation Scheme for Embedded Devices
31-42
Anonymous Signatures Made Easy
43-60
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures
61-75
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
76-88
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
89-106
New Chosen-Ciphertext Attacks on NTRU
107-117
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003
118-133
Optimistic Fair Exchange in a Multi-user Setting
134-149
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures
150-165
Knowledge-Binding Commitments with Applications in Time-Stamping
166-180
Efficient Ring Signatures Without Random Oracles
181-200
Traceable Ring Signature
201-216
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
217-232
Improved On-Line/Off-Line Threshold Signatures
233-248
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
249-265
Cryptanalysis of HFE with Internal Perturbation
266-281
l
-Invertible Cycles for
M
ultivariate
Q
uadratic (
MQ
) Public Key Cryptography
282-297
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
298-314
Parallel Key-Insulated Public Key Encryption Without Random Oracles
315-329
Multi-bit Cryptosystems Based on Lattice Problems
330-342
Practical and Secure Solutions for Integer Comparison
343-360
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
361-376
Identity-Based Traitor Tracing
377-392
Verifiable Shuffle of Large Size Ciphertexts
393-411
A Survey of Single-Database Private Information Retrieval: Techniques and Applications
412-425
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
426-441
Efficient Pseudorandom Generators Based on the DDH Assumption
442-457
Fast Batch Verification of Multiple Signatures
458-475
A Closer Look at PKI: Security and Efficiency
476-489
Self-Generated-Certificate Public Key Encryption Without Pairing