Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 2008
Preface and frontmatter
Page
Title
1-18
A Practical Attack on KeeLoq
19-30
Key Recovery on Hidden Monomial Multivariate Schemes
31-51
Predicting Lattice Reduction
52-69
Efficient Sequential Aggregate Signed Data
70-87
Proving Tight Security for Rabin-Williams Signatures
88-107
Threshold RSA for Dynamic and Ad-Hoc Groups
108-126
Towards Key-Dependent Message Security in the Standard Model
127-145
The Twin Diffie-Hellman Problem and Applications
146-162
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
163-180
Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves
181-197
On the Indifferentiability of the Sponge Construction
198-219
A New Mode of Operation for Block Ciphers and Length-Preserving MACs
220-236
Security/Efficiency Tradeoffs for Permutation-Based Hashing
237-253
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
254-269
Collisions for the LPS Expander Graph Hash Function
270-288
Second Preimage Attacks on Dithered Hash Functions
289-306
Efficient Two Party and Multi Party Computation Against Covert Adversaries
307-323
Almost-Everywhere Secure Computation
324-340
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
341-360
Protocols and Lower Bounds for Failure Localization in the Internet
361-378
HB#: Increasing the Security and Efficiency of HB+
361-378
HB
#
: Increasing the Security and Efficiency of HB
+
379-396
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle
397-414
Precise Concurrent Zero Knowledge
415-432
Efficient Non-interactive Proof Systems for Bilinear Groups
433-450
Zero-Knowledge Sets with Short Proofs
451-470
Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves
471-488
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
489-508
Obfuscating Point Functions with Multibit Output
509-526
Isolated Proofs of Knowledge and Isolated Zero Knowledge
527-544
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
545-562
New Constructions for UC Secure Computation Using Tamper-Proof Hardware