COMMENT{IACR BibTeX file created by Kevin McCurley. This work is
licensed under a Creative Commons Attribution 3.0 Unported License.
Version: 2015-04-26
}
@inproceedings{crypto-2014-25145,
title = {On the Communication Complexity of Secure Computation},
author = {Deepesh Data and Manoj Prabhakaran and Vinod M. Prabhakaran},
booktitle = {CRYPTO},
pages = {199--216},
doi = {10.1007/978-3-662-44381-1_12},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25146,
title = {Efficient Three-Party Computation from Cut-and-Choose},
author = {Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas},
booktitle = {CRYPTO},
pages = {513--530},
doi = {10.1007/978-3-662-44381-1_29},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25147,
title = {Witness Encryption from Instance Independent Assumptions},
author = {Craig Gentry and Allison B. Lewko and Brent Waters},
booktitle = {CRYPTO},
pages = {426--443},
doi = {10.1007/978-3-662-44371-2_24},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25148,
title = {Secure Multi-Party Computation with Identifiable Abort},
author = {Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas},
booktitle = {CRYPTO},
pages = {369--386},
doi = {10.1007/978-3-662-44381-1_21},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25149,
title = {Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings},
author = {Rafael Pass and Karn Seth and Sidharth Telang},
booktitle = {CRYPTO},
pages = {500--517},
doi = {10.1007/978-3-662-44371-2_28},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25150,
title = {Security of Symmetric Encryption against Mass Surveillance},
author = {Mihir Bellare and Kenneth G. Paterson and Phillip Rogaway},
booktitle = {CRYPTO},
pages = {1--19},
doi = {10.1007/978-3-662-44371-2_1},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25151,
title = {Minimizing the Two-Round Even-Mansour Cipher},
author = {Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger},
booktitle = {CRYPTO},
pages = {39--56},
doi = {10.1007/978-3-662-44371-2_3},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25152,
title = {Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups},
author = {Masayuki Abe and Jens Groth and Miyako Ohkubo and Takeya Tango},
booktitle = {CRYPTO},
pages = {241--260},
doi = {10.1007/978-3-662-44371-2_14},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25153,
title = {Feasibility and Infeasibility of Secure Computation with Malicious PUFs},
author = {Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schr\"oder},
booktitle = {CRYPTO},
pages = {405--420},
doi = {10.1007/978-3-662-44381-1_23},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25154,
title = {The Exact PRF-Security of NMAC and HMAC},
author = {Peter Gazi and Krzysztof Pietrzak and Michal Rybár},
booktitle = {CRYPTO},
pages = {113--130},
doi = {10.1007/978-3-662-44371-2_7},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25155,
title = {Round-Efficient Black-Box Construction of Composable Multi-Party Computation},
author = {Susumu Kiyoshima},
booktitle = {CRYPTO},
pages = {351--368},
doi = {10.1007/978-3-662-44381-1_20},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25156,
title = {Revisiting the Gentry-Szydlo Algorithm},
author = {H. W. Lenstra and A. Silverberg},
booktitle = {CRYPTO},
pages = {280--296},
doi = {10.1007/978-3-662-44371-2_16},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25157,
title = {Algorithms in HElib},
author = {Shai Halevi and Victor Shoup},
booktitle = {CRYPTO},
pages = {554--571},
doi = {10.1007/978-3-662-44371-2_31},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25158,
title = {Interactive Proofs under Continual Memory Leakage},
author = {Prabhanjan Ananth and Vipul Goyal and Omkant Pandey},
booktitle = {CRYPTO},
pages = {164--182},
doi = {10.1007/978-3-662-44381-1_10},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25159,
title = {FleXOR: Flexible Garbling for XOR Gates That Beats Free-XOR},
author = {Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek},
booktitle = {CRYPTO},
pages = {440--457},
doi = {10.1007/978-3-662-44381-1_25},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25160,
title = {On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input},
author = {Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs},
booktitle = {CRYPTO},
pages = {518--535},
doi = {10.1007/978-3-662-44371-2_29},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25161,
title = {Quantum Position Verification in the Random Oracle Model},
author = {Dominique Unruh},
booktitle = {CRYPTO},
pages = {1--18},
doi = {10.1007/978-3-662-44381-1_1},
publisher = {Springer},
year = {2014}
}
@proceedings{crypto-2014-25162,
title = {Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II},
booktitle = {CRYPTO},
volume = {8617},
doi = {10.1007/978-3-662-44381-1},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25163,
title = {Faster Bootstrapping with Polynomial Error},
author = {Jacob Alperin-Sheriff and Chris Peikert},
booktitle = {CRYPTO},
pages = {297--314},
doi = {10.1007/978-3-662-44371-2_17},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25164,
title = {Updates on Generic Attacks against HMAC and NMAC},
author = {Jian Guo and Thomas Peyrin and Yu Sasaki and Lei Wang},
booktitle = {CRYPTO},
pages = {131--148},
doi = {10.1007/978-3-662-44371-2_8},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25165,
title = {Security Analysis of Multilinear Maps over the Integers},
author = {Hyung Tae Lee and Jae Hong Seo},
booktitle = {CRYPTO},
pages = {224--240},
doi = {10.1007/978-3-662-44371-2_13},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25166,
title = {Proving the TLS Handshake Secure (As It Is)},
author = {Karthikeyan Bhargavan and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Santiago Zanella Béguelin},
booktitle = {CRYPTO},
pages = {235--255},
doi = {10.1007/978-3-662-44381-1_14},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25167,
title = {Automated Analysis of Cryptographic Assumptions in Generic Group Models},
author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and John C. Mitchell and Andre Scedrov and Benedikt Schmidt},
booktitle = {CRYPTO},
pages = {95--112},
doi = {10.1007/978-3-662-44371-2_6},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25168,
title = {Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications},
author = {Takashi Yamakawa and Shota Yamada 0001 and Goichiro Hanaoka and Noboru Kunihiro},
booktitle = {CRYPTO},
pages = {90--107},
doi = {10.1007/978-3-662-44381-1_6},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25169,
title = {Single-Shot Security for One-Time Memories in the Isolated Qubits Model},
author = {Yi-Kai Liu},
booktitle = {CRYPTO},
pages = {19--36},
doi = {10.1007/978-3-662-44381-1_2},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25170,
title = {Amplifying Privacy in Privacy Amplification},
author = {Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin},
booktitle = {CRYPTO},
pages = {183--198},
doi = {10.1007/978-3-662-44381-1_11},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25171,
title = {Hardness of k-LWE and Applications in Traitor Tracing},
author = {San Ling and Duong Hieu Phan and Damien Stehl\'e and Ron Steinfeld},
booktitle = {CRYPTO},
pages = {315--334},
doi = {10.1007/978-3-662-44371-2_18},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25172,
title = {On the Impossibility of Cryptography with Tamperable Randomness},
author = {Per Austrin and Kai-Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth},
booktitle = {CRYPTO},
pages = {462--479},
doi = {10.1007/978-3-662-44371-2_26},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25173,
title = {Non-Interactive Secure Multiparty Computation},
author = {Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin-Cherniavsky},
booktitle = {CRYPTO},
pages = {387--404},
doi = {10.1007/978-3-662-44381-1_22},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25174,
title = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation},
author = {Dan Boneh and Mark Zhandry},
booktitle = {CRYPTO},
pages = {480--499},
doi = {10.1007/978-3-662-44371-2_27},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25175,
title = {Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity},
author = {Ran Canetti and Abhishek Jain and Omer Paneth},
booktitle = {CRYPTO},
pages = {337--350},
doi = {10.1007/978-3-662-44381-1_19},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25176,
title = {Physical Zero-Knowledge Proofs of Physical Properties},
author = {Ben Fisch and Daniel Freund and Moni Naor},
booktitle = {CRYPTO},
pages = {313--336},
doi = {10.1007/978-3-662-44381-1_18},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25177,
title = {Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment},
author = {Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven},
booktitle = {CRYPTO},
pages = {256--275},
doi = {10.1007/978-3-662-44381-1_15},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25178,
title = {Maliciously Circuit-Private FHE},
author = {Rafail Ostrovsky and Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky},
booktitle = {CRYPTO},
pages = {536--553},
doi = {10.1007/978-3-662-44371-2_30},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25179,
title = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication},
author = {Olivier Blazy and Eike Kiltz and Jiaxin Pan},
booktitle = {CRYPTO},
pages = {408--425},
doi = {10.1007/978-3-662-44371-2_23},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25180,
title = {Improved Generic Attacks against Hash-Based MACs and HAIFA},
author = {Itai Dinur and Ga\"etan Leurent},
booktitle = {CRYPTO},
pages = {149--168},
doi = {10.1007/978-3-662-44371-2_9},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25181,
title = {The Security of Multiple Encryption in the Ideal Cipher Model},
author = {Yuanxi Dai and Jooyoung Lee and Bart Mennink and John P. Steinberger},
booktitle = {CRYPTO},
pages = {20--38},
doi = {10.1007/978-3-662-44371-2_2},
publisher = {Springer},
year = {2014}
}
@proceedings{crypto-2014-25182,
title = {Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I},
booktitle = {CRYPTO},
volume = {8616},
doi = {10.1007/978-3-662-44371-2},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25183,
title = {Block Ciphers - Focus on the Linear Layer (feat. PRIDE)},
author = {Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yalçin},
booktitle = {CRYPTO},
pages = {57--76},
doi = {10.1007/978-3-662-44371-2_4},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25184,
title = {Breaking '128-bit Secure' Supersingular Binary Curves - (Or How to Solve Discrete Logarithms in F_{24 1223} and F_{212 367})},
author = {Robert Granger and Thorsten Kleinjung and Jens Zumbrägel},
booktitle = {CRYPTO},
pages = {126--145},
doi = {10.1007/978-3-662-44381-1_8},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25185,
title = {Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings},
author = {Yehuda Lindell and Ben Riva},
booktitle = {CRYPTO},
pages = {476--494},
doi = {10.1007/978-3-662-44381-1_27},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25186,
title = {Optimal Non-perfect Uniform Secret Sharing Schemes},
author = {Oriol Farr\`as and Torben Hansen and Tarik Kaced and Carles Padró},
booktitle = {CRYPTO},
pages = {217--234},
doi = {10.1007/978-3-662-44381-1_13},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25187,
title = {Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations},
author = {Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla R\`afols and Andy Rupp},
booktitle = {CRYPTO},
pages = {261--279},
doi = {10.1007/978-3-662-44371-2_15},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25188,
title = {Amortizing Garbled Circuits},
author = {Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff},
booktitle = {CRYPTO},
pages = {458--475},
doi = {10.1007/978-3-662-44381-1_26},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25189,
title = {Scalable Zero Knowledge via Cycles of Elliptic Curves},
author = {Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza},
booktitle = {CRYPTO},
pages = {276--294},
doi = {10.1007/978-3-662-44381-1_16},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25190,
title = {Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources},
author = {Christina Brzuska and Pooya Farshim and Arno Mittelbach},
booktitle = {CRYPTO},
pages = {188--205},
doi = {10.1007/978-3-662-44371-2_11},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25191,
title = {Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces},
author = {Charanjit S. Jutla and Arnab Roy},
booktitle = {CRYPTO},
pages = {295--312},
doi = {10.1007/978-3-662-44381-1_17},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25192,
title = {Structure-Preserving Signatures from Type II Pairings},
author = {Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi},
booktitle = {CRYPTO},
pages = {390--407},
doi = {10.1007/978-3-662-44371-2_22},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25193,
title = {Homomorphic Signatures with Efficient Verification for Polynomial Functions},
author = {Dario Catalano and Dario Fiore and Bogdan Warinschi},
booktitle = {CRYPTO},
pages = {371--389},
doi = {10.1007/978-3-662-44371-2_21},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25194,
title = {Leakage-Tolerant Computation with Input-Independent Preprocessing},
author = {Nir Bitansky and Dana Dachman-Soled and Huijia Lin},
booktitle = {CRYPTO},
pages = {146--163},
doi = {10.1007/978-3-662-44381-1_9},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25195,
title = {Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier},
author = {Michel Abdalla and Fabrice Benhamouda and Alain Passelègue and Kenneth G. Paterson},
booktitle = {CRYPTO},
pages = {77--94},
doi = {10.1007/978-3-662-44371-2_5},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25196,
title = {New and Improved Key-Homomorphic Pseudorandom Functions},
author = {Abhishek Banerjee 0001 and Chris Peikert},
booktitle = {CRYPTO},
pages = {353--370},
doi = {10.1007/978-3-662-44371-2_20},
publisher = {Springer},
year = {2014}
}
@misc{CRYPTO-2014-25964,
title = {Caught in Between Theory and Practice},
author = {Mihir Bellare},
year = {2014}
}
@inproceedings{crypto-2014-25197,
title = {The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator},
author = {Nir Bitansky and Ran Canetti and Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai and Omer Paneth and Alon Rosen},
booktitle = {CRYPTO},
pages = {71--89},
doi = {10.1007/978-3-662-44381-1_5},
publisher = {Springer},
year = {2014}
}
@misc{CRYPTO-2014-25965,
title = {How to delegate computations: the power of no-signaling proofs},
author = {Yael Tauman Kalai},
year = {2014}
}
@inproceedings{crypto-2014-25198,
title = {How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs},
author = {Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs},
booktitle = {CRYPTO},
pages = {37--54},
doi = {10.1007/978-3-662-44381-1_3},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25199,
title = {Low Overhead Broadcast Encryption from Multilinear Maps},
author = {Dan Boneh and Brent Waters and Mark Zhandry},
booktitle = {CRYPTO},
pages = {206--223},
doi = {10.1007/978-3-662-44371-2_12},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25200,
title = {Improved Short Lattice Signatures in the Standard Model},
author = {Léo Ducas and Daniele Micciancio},
booktitle = {CRYPTO},
pages = {335--352},
doi = {10.1007/978-3-662-44371-2_19},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25201,
title = {RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis},
author = {Daniel Genkin and Adi Shamir and Eran Tromer},
booktitle = {CRYPTO},
pages = {444--461},
doi = {10.1007/978-3-662-44371-2_25},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25202,
title = {Cryptography from Compression Functions: The UCE Bridge to the ROM},
author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi},
booktitle = {CRYPTO},
pages = {169--187},
doi = {10.1007/978-3-662-44371-2_10},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25203,
title = {Dishonest Majority Multi-Party Computation for Binary Circuits},
author = {Enrique Larraia and Emmanuela Orsini and Nigel P. Smart},
booktitle = {CRYPTO},
pages = {495--512},
doi = {10.1007/978-3-662-44381-1_28},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25204,
title = {Cryptography with Streaming Algorithms},
author = {Periklis A. Papakonstantinou and Guang Yang},
booktitle = {CRYPTO},
pages = {55--70},
doi = {10.1007/978-3-662-44381-1_4},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25205,
title = {How to Use Bitcoin to Design Fair Protocols},
author = {Iddo Bentov and Ranjit Kumaresan},
booktitle = {CRYPTO},
pages = {421--439},
doi = {10.1007/978-3-662-44381-1_24},
publisher = {Springer},
year = {2014}
}
@inproceedings{crypto-2014-25206,
title = {On Virtual Grey Box Obfuscation for General Circuits},
author = {Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth},
booktitle = {CRYPTO},
pages = {108--125},
doi = {10.1007/978-3-662-44381-1_7},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25207,
title = {The Locality of Searchable Symmetric Encryption},
author = {David Cash and Stefano Tessaro},
booktitle = {EUROCRYPT},
pages = {351--368},
doi = {10.1007/978-3-642-55220-5_20},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25208,
title = {Efficient Round Optimal Blind Signatures},
author = {Sanjam Garg and Divya Gupta},
booktitle = {EUROCRYPT},
pages = {477--495},
doi = {10.1007/978-3-642-55220-5_27},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25209,
title = {Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack},
author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao},
booktitle = {EUROCRYPT},
pages = {77--92},
doi = {10.1007/978-3-642-55220-5_5},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25210,
title = {Key Derivation without Entropy Waste},
author = {Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs},
booktitle = {EUROCRYPT},
pages = {93--110},
doi = {10.1007/978-3-642-55220-5_6},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25211,
title = {Generic Universal Forgery Attack on Iterative Hash-Based MACs},
author = {Thomas Peyrin and Lei Wang},
booktitle = {EUROCRYPT},
pages = {147--164},
doi = {10.1007/978-3-642-55220-5_9},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25212,
title = {Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures},
author = {Beno\^\it Libert and Thomas Peters and Marc Joye and Moti Yung},
booktitle = {EUROCRYPT},
pages = {514--532},
doi = {10.1007/978-3-642-55220-5_29},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25213,
title = {Garbled RAM Revisited},
author = {Craig Gentry and Shai Halevi and Steve Lu and Rafail Ostrovsky and Mariana Raykova and Daniel Wichs},
booktitle = {EUROCRYPT},
pages = {405--422},
doi = {10.1007/978-3-642-55220-5_23},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25214,
title = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage},
author = {Alexandre Duc and Stefan Dziembowski and Sebastian Faust},
booktitle = {EUROCRYPT},
pages = {423--440},
doi = {10.1007/978-3-642-55220-5_24},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25215,
title = {Reconsidering Generic Composition},
author = {Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton},
booktitle = {EUROCRYPT},
pages = {257--274},
doi = {10.1007/978-3-642-55220-5_15},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25216,
title = {Non-Interactive Secure Computation Based on Cut-and-Choose},
author = {Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva},
booktitle = {EUROCRYPT},
pages = {387--404},
doi = {10.1007/978-3-642-55220-5_22},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25217,
title = {Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig},
author = {Mihir Bellare and Sarah Meiklejohn and Susan Thomson 0001},
booktitle = {EUROCRYPT},
pages = {496--513},
doi = {10.1007/978-3-642-55220-5_28},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25218,
title = {Higher Order Masking of Look-Up Tables},
author = {Jean-S\'ebastien Coron},
booktitle = {EUROCRYPT},
pages = {441--458},
doi = {10.1007/978-3-642-55220-5_25},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25219,
title = {Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation},
author = {Susan Hohenberger and Amit Sahai and Brent Waters},
booktitle = {EUROCRYPT},
pages = {201--220},
doi = {10.1007/978-3-642-55220-5_12},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25220,
title = {Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions},
author = {Kazuhiko Minematsu},
booktitle = {EUROCRYPT},
pages = {275--292},
doi = {10.1007/978-3-642-55220-5_16},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25221,
title = {Distributed Point Functions and Their Applications},
author = {Niv Gilboa and Yuval Ishai},
booktitle = {EUROCRYPT},
pages = {640--658},
doi = {10.1007/978-3-642-55220-5_35},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25222,
title = {Multi-input Functional Encryption},
author = {Shafi Goldwasser and S. Dov Gordon and Vipul Goyal and Abhishek Jain and Jonathan Katz and Feng-Hao Liu and Amit Sahai and Elaine Shi and Hong-Sheng Zhou},
booktitle = {EUROCRYPT},
pages = {578--602},
doi = {10.1007/978-3-642-55220-5_32},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25223,
title = {How to Certify the Leakage of a Chip?},
author = {François Durvaux and Fran\c cois-Xavier Standaert and Nicolas Veyrat-Charvillon},
booktitle = {EUROCRYPT},
pages = {459--476},
doi = {10.1007/978-3-642-55220-5_26},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25224,
title = {Revocable Quantum Timed-Release Encryption},
author = {Dominique Unruh},
booktitle = {EUROCRYPT},
pages = {129--146},
doi = {10.1007/978-3-642-55220-5_8},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25225,
title = {Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus},
author = {Jean-Charles Faug\`ere and Louise Huot and Antoine Joux and Guénaël Renault and Vanessa Vitse},
booktitle = {EUROCRYPT},
pages = {40--57},
doi = {10.1007/978-3-642-55220-5_3},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25226,
title = {D\éj\à Q: Using Dual Systems to Revisit q-Type Assumptions},
author = {Melissa Chase and Sarah Meiklejohn},
booktitle = {EUROCRYPT},
pages = {622--639},
doi = {10.1007/978-3-642-55220-5_34},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25227,
title = {Polynomial Time Attack on Wild McEliece over Quadratic Extensions},
author = {Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich},
booktitle = {EUROCRYPT},
pages = {17--39},
doi = {10.1007/978-3-642-55220-5_2},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25228,
title = {Faster Compact Diffie-Hellman: Endomorphisms on the x-line},
author = {Craig Costello and Hüseyin Hisil and Benjamin Smith},
booktitle = {EUROCRYPT},
pages = {183--200},
doi = {10.1007/978-3-642-55220-5_11},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25229,
title = {Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time},
author = {Ben Morris and Phillip Rogaway},
booktitle = {EUROCRYPT},
pages = {311--326},
doi = {10.1007/978-3-642-55220-5_18},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25230,
title = {A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic},
author = {Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thom\'e},
booktitle = {EUROCRYPT},
pages = {1--16},
doi = {10.1007/978-3-642-55220-5_1},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25231,
title = {A Full Characterization of Completeness for Two-Party Randomized Function Evaluation},
author = {Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai},
booktitle = {EUROCRYPT},
pages = {659--676},
doi = {10.1007/978-3-642-55220-5_36},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25232,
title = {Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More},
author = {Nuttapong Attrapadung},
booktitle = {EUROCRYPT},
pages = {557--577},
doi = {10.1007/978-3-642-55220-5_31},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25233,
title = {Salvaging Indifferentiability in a Multi-stage Setting},
author = {Arno Mittelbach},
booktitle = {EUROCRYPT},
pages = {603--621},
doi = {10.1007/978-3-642-55220-5_33},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25234,
title = {A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing},
author = {Himanshu Tyagi and Shun Watanabe},
booktitle = {EUROCRYPT},
pages = {369--386},
doi = {10.1007/978-3-642-55220-5_21},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25235,
title = {Tight Security Bounds for Key-Alternating Ciphers},
author = {Shan Chen and John P. Steinberger},
booktitle = {EUROCRYPT},
pages = {327--350},
doi = {10.1007/978-3-642-55220-5_19},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25236,
title = {Honey Encryption: Security Beyond the Brute-Force Bound},
author = {Ari Juels and Thomas Ristenpart},
booktitle = {EUROCRYPT},
pages = {293--310},
doi = {10.1007/978-3-642-55220-5_17},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25237,
title = {Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits},
author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs},
booktitle = {EUROCRYPT},
pages = {111--128},
doi = {10.1007/978-3-642-55220-5_7},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25238,
title = {Why Proving HIBE Systems Secure Is Difficult},
author = {Allison B. Lewko and Brent Waters},
booktitle = {EUROCRYPT},
pages = {58--76},
doi = {10.1007/978-3-642-55220-5_4},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25239,
title = {Protecting Obfuscation against Algebraic Attacks},
author = {Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai},
booktitle = {EUROCRYPT},
pages = {221--238},
doi = {10.1007/978-3-642-55220-5_13},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25240,
title = {GGHLite: More Efficient Multilinear Maps from Ideal Lattices},
author = {Adeline Langlois and Damien Stehl\'e and Ron Steinfeld},
booktitle = {EUROCRYPT},
pages = {239--256},
doi = {10.1007/978-3-642-55220-5_14},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25241,
title = {Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption},
author = {Morten Dahl and Ivan Damg\r ard},
booktitle = {EUROCRYPT},
pages = {695--712},
doi = {10.1007/978-3-642-55220-5_38},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25242,
title = {On the Complexity of UC Commitments},
author = {Juan A. Garay and Yuval Ishai and Ranjit Kumaresan and Hoeteck Wee},
booktitle = {EUROCRYPT},
pages = {677--694},
doi = {10.1007/978-3-642-55220-5_37},
publisher = {Springer},
year = {2014}
}
@proceedings{eurocrypt-2014-25243,
title = {Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings},
booktitle = {EUROCRYPT},
volume = {8441},
doi = {10.1007/978-3-642-55220-5},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25244,
title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits},
author = {Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy},
booktitle = {EUROCRYPT},
pages = {533--556},
doi = {10.1007/978-3-642-55220-5_30},
publisher = {Springer},
year = {2014}
}
@inproceedings{eurocrypt-2014-25245,
title = {Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities},
author = {C\'eline Blondeau and Kaisa Nyberg},
booktitle = {EUROCRYPT},
pages = {165--182},
doi = {10.1007/978-3-642-55220-5_10},
publisher = {Springer},
year = {2014}
}
@article{jofc-2014-25940,
title = {Key-Dependent Message Security: Generic Amplification and Completeness},
author = {Benny Applebaum},
journal = {J. Cryptology},
volume = {27},
pages = {429--451},
doi = {10.1007/s00145-013-9149-6},
year = {2014}
}
@article{jofc-2014-25941,
title = {Security Models and Proof Strategies for Plaintext-Aware Encryption},
author = {James Birkett and Alexander W. Dent},
journal = {J. Cryptology},
volume = {27},
pages = {139--180},
doi = {10.1007/s00145-012-9141-6},
year = {2014}
}
@article{jofc-2014-25942,
title = {Rotational Rebound Attacks on Reduced Skein},
author = {Dmitry Khovratovich and Ivica Nikolic and Christian Rechberger},
journal = {J. Cryptology},
volume = {27},
pages = {452--479},
doi = {10.1007/s00145-013-9150-0},
year = {2014}
}
@article{jofc-2014-25943,
title = {An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers},
author = {Paul Stankovski and Martin Hell and Thomas Johansson},
journal = {J. Cryptology},
volume = {27},
pages = {1--22},
doi = {10.1007/s00145-012-9130-9},
year = {2014}
}
@article{jofc-2014-25944,
title = {Cryptography in the Multi-string Model},
author = {Jens Groth and Rafail Ostrovsky},
journal = {J. Cryptology},
volume = {27},
pages = {506--543},
doi = {10.1007/s00145-013-9152-y},
year = {2014}
}
@article{jofc-2014-25945,
title = {Computationally Secure Pattern Matching in the Presence of Malicious Adversaries},
author = {Carmit Hazay and Tomas Toft},
journal = {J. Cryptology},
volume = {27},
pages = {358--395},
doi = {10.1007/s00145-013-9147-8},
year = {2014}
}
@article{jofc-2014-25946,
title = {A One-Time Stegosystem and Applications to Efficient Covert Communication},
author = {Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha Shashidhar},
journal = {J. Cryptology},
volume = {27},
pages = {23--44},
doi = {10.1007/s00145-012-9135-4},
year = {2014}
}
@article{jofc-2014-25947,
title = {Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting},
author = {Zvika Brakerski and Gil Segev},
journal = {J. Cryptology},
volume = {27},
pages = {210--247},
doi = {10.1007/s00145-012-9143-4},
year = {2014}
}
@article{jofc-2014-25948,
title = {On Strong Simulation and Composable Point Obfuscation},
author = {Nir Bitansky and Ran Canetti},
journal = {J. Cryptology},
volume = {27},
pages = {317--357},
doi = {10.1007/s00145-013-9146-9},
year = {2014}
}
@article{jofc-2014-25949,
title = {Authenticated Adversarial Routing},
author = {Yair Amir and Paul Bunn and Rafail Ostrovsky},
journal = {J. Cryptology},
volume = {27},
pages = {636--771},
doi = {10.1007/s00145-013-9157-6},
year = {2014}
}
@article{jofc-2014-25950,
title = {On the Amortized Complexity of Zero-Knowledge Protocols},
author = {Ronald Cramer and Ivan Damg\r ard and Marcel Keller},
journal = {J. Cryptology},
volume = {27},
pages = {284--316},
doi = {10.1007/s00145-013-9145-x},
year = {2014}
}
@article{jofc-2014-25951,
title = {Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm},
author = {Jean-Charles Faug\`ere and Pierrick Gaudry and Louise Huot and Guénaël Renault},
journal = {J. Cryptology},
volume = {27},
pages = {595--635},
doi = {10.1007/s00145-013-9158-5},
year = {2014}
}
@article{jofc-2014-25952,
title = {(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher},
author = {Sourav Sen Gupta and Subhamoy Maitra and Goutam Paul and Santanu Sarkar},
journal = {J. Cryptology},
volume = {27},
pages = {67--108},
doi = {10.1007/s00145-012-9138-1},
year = {2014}
}
@article{jofc-2014-25953,
title = {A New Interactive Hashing Theorem},
author = {Iftach Haitner and Omer Reingold},
journal = {J. Cryptology},
volume = {27},
pages = {109--138},
doi = {10.1007/s00145-012-9139-0},
year = {2014}
}
@article{jofc-2014-25954,
title = {Concurrent Zero Knowledge, Revisited},
author = {Rafael Pass and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam},
journal = {J. Cryptology},
volume = {27},
pages = {45--66},
doi = {10.1007/s00145-012-9137-2},
year = {2014}
}
@article{jofc-2014-25955,
title = {On Best-Possible Obfuscation},
author = {Shafi Goldwasser and Guy N. Rothblum},
journal = {J. Cryptology},
volume = {27},
pages = {480--505},
doi = {10.1007/s00145-013-9151-z},
year = {2014}
}
@article{jofc-2014-25956,
title = {Improved Practical Attacks on Round-Reduced Keccak},
author = {Itai Dinur and Orr Dunkelman and Adi Shamir},
journal = {J. Cryptology},
volume = {27},
pages = {183--209},
doi = {10.1007/s00145-012-9142-5},
year = {2014}
}
@article{jofc-2014-25957,
title = {Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms},
author = {Jin Hong and Sunghwan Moon},
journal = {J. Cryptology},
volume = {27},
pages = {181},
doi = {10.1007/s00145-012-9140-7},
year = {2014}
}
@article{jofc-2014-25958,
title = {Improved Cryptanalysis of AES-like Permutations},
author = {Jérémy Jean and Mar\'\ia Naya-Plasencia and Thomas Peyrin},
journal = {J. Cryptology},
volume = {27},
pages = {772--798},
doi = {10.1007/s00145-013-9156-7},
year = {2014}
}
@article{jofc-2014-25959,
title = {Robust Multi-Property Combiners for Hash Functions},
author = {Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak},
journal = {J. Cryptology},
volume = {27},
pages = {397--428},
doi = {10.1007/s00145-013-9148-7},
year = {2014}
}
@article{jofc-2014-25960,
title = {Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions},
author = {Michel Abdalla and Dario Catalano and Dario Fiore},
journal = {J. Cryptology},
volume = {27},
pages = {544--593},
doi = {10.1007/s00145-013-9153-x},
year = {2014}
}
@article{jofc-2014-25961,
title = {Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication},
author = {Patrick Longa and Francesco Sica},
journal = {J. Cryptology},
volume = {27},
pages = {248--283},
doi = {10.1007/s00145-012-9144-3},
year = {2014}
}
@article{jofc-2014-25962,
title = {A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony},
author = {Orr Dunkelman and Nathan Keller and Adi Shamir},
journal = {J. Cryptology},
volume = {27},
pages = {824--849},
doi = {10.1007/s00145-013-9154-9},
year = {2014}
}
@article{jofc-2014-25963,
title = {A Characterization of Chameleon Hash Functions and New, Efficient Designs},
author = {Mihir Bellare and Todor Ristov},
journal = {J. Cryptology},
volume = {27},
pages = {799--823},
doi = {10.1007/s00145-013-9155-8},
year = {2014}
}
@inproceedings{pkc-2014-25246,
title = {Leakage-Resilient Signatures with Graceful Degradation},
author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel},
booktitle = {PKC},
pages = {362--379},
doi = {10.1007/978-3-642-54631-0_21},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25247,
title = {Lazy Modulus Switching for the BKW Algorithm on LWE},
author = {Martin R. Albrecht and Jean-Charles Faug\`ere and Robert Fitzpatrick and Ludovic Perret},
booktitle = {PKC},
pages = {429--445},
doi = {10.1007/978-3-642-54631-0_25},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25248,
title = {Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks},
author = {Florian Böhl and Gareth T. Davies and Dennis Hofheinz},
booktitle = {PKC},
pages = {483--500},
doi = {10.1007/978-3-642-54631-0_28},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25249,
title = {Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice},
author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi},
booktitle = {PKC},
pages = {411--428},
doi = {10.1007/978-3-642-54631-0_24},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25250,
title = {Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications},
author = {Alex Escala and Javier Herranz and Beno\^\it Libert and Carla R\`afols},
booktitle = {PKC},
pages = {239--256},
doi = {10.1007/978-3-642-54631-0_14},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25251,
title = {Elliptic and Hyperelliptic Curves: A Practical Security Analysis},
author = {Joppe W. Bos and Craig Costello and Andrea Miele},
booktitle = {PKC},
pages = {203--220},
doi = {10.1007/978-3-642-54631-0_12},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25252,
title = {Practical Covert Authentication},
author = {Stanislaw Jarecki},
booktitle = {PKC},
pages = {611--629},
doi = {10.1007/978-3-642-54631-0_35},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25253,
title = {Verifiable Oblivious Storage},
author = {Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam},
booktitle = {PKC},
pages = {131--148},
doi = {10.1007/978-3-642-54631-0_8},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25254,
title = {Online/Offline Attribute-Based Encryption},
author = {Susan Hohenberger and Brent Waters},
booktitle = {PKC},
pages = {293--310},
doi = {10.1007/978-3-642-54631-0_17},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25255,
title = {Policy-Based Signatures},
author = {Mihir Bellare and Georg Fuchsbauer},
booktitle = {PKC},
pages = {520--537},
doi = {10.1007/978-3-642-54631-0_30},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25256,
title = {General Impossibility of Group Homomorphic Encryption in the Quantum World},
author = {Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter},
booktitle = {PKC},
pages = {556--573},
doi = {10.1007/978-3-642-54631-0_32},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25257,
title = {On Minimal Assumptions for Sender-Deniable Public Key Encryption},
author = {Dana Dachman-Soled},
booktitle = {PKC},
pages = {574--591},
doi = {10.1007/978-3-642-54631-0_33},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25258,
title = {Traceable Group Encryption},
author = {Beno\^\it Libert and Moti Yung and Marc Joye and Thomas Peters},
booktitle = {PKC},
pages = {592--610},
doi = {10.1007/978-3-642-54631-0_34},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25259,
title = {Fine-Tuning Groth-Sahai Proofs},
author = {Alex Escala and Jens Groth},
booktitle = {PKC},
pages = {630--649},
doi = {10.1007/978-3-642-54631-0_36},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25260,
title = {Solving Random Subset Sum Problem by l p -norm SVP Oracle},
author = {Gengran Hu and Yanbin Pan and Feng Zhang},
booktitle = {PKC},
pages = {399--410},
doi = {10.1007/978-3-642-54631-0_23},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25261,
title = {Chosen Ciphertext Security via UCE},
author = {Takahiro Matsuda and Goichiro Hanaoka},
booktitle = {PKC},
pages = {56--76},
doi = {10.1007/978-3-642-54631-0_4},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25262,
title = {A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption},
author = {Shota Yamada 0001 and Nuttapong Attrapadung and Goichiro Hanaoka and Noboru Kunihiro},
booktitle = {PKC},
pages = {275--292},
doi = {10.1007/978-3-642-54631-0_16},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25263,
title = {Scale-Invariant Fully Homomorphic Encryption over the Integers},
author = {Jean-S\'ebastien Coron and Tancrède Lepoint and Mehdi Tibouchi},
booktitle = {PKC},
pages = {311--328},
doi = {10.1007/978-3-642-54631-0_18},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25264,
title = {Related Randomness Attacks for Public Key Encryption},
author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn},
booktitle = {PKC},
pages = {465--482},
doi = {10.1007/978-3-642-54631-0_27},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25265,
title = {Cross-Domain Secure Computation},
author = {Chongwon Cho and Sanjam Garg and Rafail Ostrovsky},
booktitle = {PKC},
pages = {650--668},
doi = {10.1007/978-3-642-54631-0_37},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25266,
title = {Proxy Re-encryption from Lattices},
author = {Elena Kirshanova},
booktitle = {PKC},
pages = {77--94},
doi = {10.1007/978-3-642-54631-0_5},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25267,
title = {Enhanced Chosen-Ciphertext Security and Applications},
author = {Dana Dachman-Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill},
booktitle = {PKC},
pages = {329--344},
doi = {10.1007/978-3-642-54631-0_19},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25268,
title = {Simple Chosen-Ciphertext Security from Low-Noise LPN},
author = {Eike Kiltz and Daniel Masny and Krzysztof Pietrzak},
booktitle = {PKC},
pages = {1--18},
doi = {10.1007/978-3-642-54631-0_1},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25269,
title = {Discrete Logarithm in GF(2809) with FFS},
author = {Razvan Barbulescu and Cyril Bouvier and J\'er\'emie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thom\'e and Marion Videau and Paul Zimmermann},
booktitle = {PKC},
pages = {221--238},
doi = {10.1007/978-3-642-54631-0_13},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25270,
title = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions},
author = {Martin R. Albrecht and Jean-Charles Faug\`ere and Robert Fitzpatrick and Ludovic Perret and Yosuke Todo and Keita Xagawa},
booktitle = {PKC},
pages = {446--464},
doi = {10.1007/978-3-642-54631-0_26},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25271,
title = {Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences},
author = {Jingguo Bi and Jean-S\'ebastien Coron and Jean-Charles Faug\`ere and Phong Q. Nguyen and Guénaël Renault and Rina Zeitoun},
booktitle = {PKC},
pages = {185--202},
doi = {10.1007/978-3-642-54631-0_11},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25272,
title = {Verifiable Set Operations over Outsourced Databases},
author = {Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos},
booktitle = {PKC},
pages = {113--130},
doi = {10.1007/978-3-642-54631-0_7},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25273,
title = {Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts},
author = {Stefano Tessaro and David A. Wilson},
booktitle = {PKC},
pages = {257--274},
doi = {10.1007/978-3-642-54631-0_15},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25274,
title = {A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme},
author = {Dana Dachman-Soled},
booktitle = {PKC},
pages = {37--55},
doi = {10.1007/978-3-642-54631-0_3},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25275,
title = {Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices},
author = {Nishanth Chandran and Melissa Chase and Feng-Hao Liu and Ryo Nishimaki and Keita Xagawa},
booktitle = {PKC},
pages = {95--112},
doi = {10.1007/978-3-642-54631-0_6},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25276,
title = {Lattice-Based Group Signature Scheme with Verifier-Local Revocation},
author = {Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang},
booktitle = {PKC},
pages = {345--361},
doi = {10.1007/978-3-642-54631-0_20},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25277,
title = {On the Security of the Pre-shared Key Ciphersuites of TLS},
author = {Yong Li and Sven Sch\"age and Zheng Yang and Florian Kohlar and J\"org Schwenk},
booktitle = {PKC},
pages = {669--684},
doi = {10.1007/978-3-642-54631-0_38},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25278,
title = {Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing},
author = {Baodong Qin and Shengli Liu},
booktitle = {PKC},
pages = {19--36},
doi = {10.1007/978-3-642-54631-0_2},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25279,
title = {On the Lossiness of the Rabin Trapdoor Function},
author = {Yannick Seurin},
booktitle = {PKC},
pages = {380--398},
doi = {10.1007/978-3-642-54631-0_22},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25280,
title = {Generalizing Homomorphic MACs for Arithmetic Circuits},
author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo},
booktitle = {PKC},
pages = {538--555},
doi = {10.1007/978-3-642-54631-0_31},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25281,
title = {Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing},
author = {Prabhanjan Ananth and Nishanth Chandran and Vipul Goyal and Bhavana Kanukurthi and Rafail Ostrovsky},
booktitle = {PKC},
pages = {149--166},
doi = {10.1007/978-3-642-54631-0_9},
publisher = {Springer},
year = {2014}
}
@proceedings{pkc-2014-25282,
title = {Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings},
booktitle = {PKC},
volume = {8383},
doi = {10.1007/978-3-642-54631-0},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25283,
title = {Functional Signatures and Pseudorandom Functions},
author = {Elette Boyle and Shafi Goldwasser and Ioana Ivan},
booktitle = {PKC},
pages = {501--519},
doi = {10.1007/978-3-642-54631-0_29},
publisher = {Springer},
year = {2014}
}
@inproceedings{pkc-2014-25284,
title = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting},
author = {S\'ebastien Canard and David Pointcheval and Olivier Sanders},
booktitle = {PKC},
pages = {167--184},
doi = {10.1007/978-3-642-54631-0_10},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25286,
title = {Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?},
author = {Dana Dachman-Soled and Mohammad Mahmoody and Tal Malkin},
booktitle = {TCC},
pages = {217--239},
doi = {10.1007/978-3-642-54242-8_10},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25287,
title = {Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures},
author = {Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi},
booktitle = {TCC},
pages = {688--712},
doi = {10.1007/978-3-642-54242-8_29},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25288,
title = {Securing Circuits and Protocols against 1/poly(k) Tampering Rate},
author = {Dana Dachman-Soled and Yael Tauman Kalai},
booktitle = {TCC},
pages = {540--565},
doi = {10.1007/978-3-642-54242-8_23},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25289,
title = {Standard versus Selective Opening Security: Separation and Equivalence Results},
author = {Dennis Hofheinz and Andy Rupp},
booktitle = {TCC},
pages = {591--615},
doi = {10.1007/978-3-642-54242-8_25},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25290,
title = {On the Impossibility of Structure-Preserving Deterministic Primitives},
author = {Masayuki Abe and Jan Camenisch and Rafael Dowsley and Maria Dubovitskaya},
booktitle = {TCC},
pages = {713--738},
doi = {10.1007/978-3-642-54242-8_30},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25291,
title = {On the Cryptographic Complexity of the Worst Functions},
author = {Amos Beimel and Yuval Ishai and Ranjit Kumaresan and Eyal Kushilevitz},
booktitle = {TCC},
pages = {317--342},
doi = {10.1007/978-3-642-54242-8_14},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25292,
title = {Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding},
author = {Zvika Brakerski and Guy N. Rothblum},
booktitle = {TCC},
pages = {1--25},
doi = {10.1007/978-3-642-54242-8_1},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25293,
title = {Broadcast Amplification},
author = {Martin Hirt and Ueli Maurer and Pavel Raykov},
booktitle = {TCC},
pages = {419--439},
doi = {10.1007/978-3-642-54242-8_18},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25294,
title = {Chosen Ciphertext Security via Point Obfuscation},
author = {Takahiro Matsuda and Goichiro Hanaoka},
booktitle = {TCC},
pages = {95--120},
doi = {10.1007/978-3-642-54242-8_5},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25295,
title = {How to Fake Auxiliary Input},
author = {Dimitar Jetchev and Krzysztof Pietrzak},
booktitle = {TCC},
pages = {566--590},
doi = {10.1007/978-3-642-54242-8_24},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25296,
title = {Two-Round Secure MPC from Indistinguishability Obfuscation},
author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova},
booktitle = {TCC},
pages = {74--94},
doi = {10.1007/978-3-642-54242-8_4},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25297,
title = {Dual System Encryption via Predicate Encodings},
author = {Hoeteck Wee},
booktitle = {TCC},
pages = {616--637},
doi = {10.1007/978-3-642-54242-8_26},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25298,
title = {Obfuscation for Evasive Functions},
author = {Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai},
booktitle = {TCC},
pages = {26--51},
doi = {10.1007/978-3-642-54242-8_2},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25299,
title = {One-Sided Adaptively Secure Two-Party Computation},
author = {Carmit Hazay and Arpita Patra},
booktitle = {TCC},
pages = {368--393},
doi = {10.1007/978-3-642-54242-8_16},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25300,
title = {On the Power of Public-Key Encryption in Secure Computation},
author = {Mohammad Mahmoody and Hemanta K. Maji and Manoj Prabhakaran},
booktitle = {TCC},
pages = {240--264},
doi = {10.1007/978-3-642-54242-8_11},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25301,
title = {Locally Updatable and Locally Decodable Codes},
author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky},
booktitle = {TCC},
pages = {489--514},
doi = {10.1007/978-3-642-54242-8_21},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25302,
title = {4-Round Resettably-Sound Zero Knowledge},
author = {Kai-Min Chung and Rafail Ostrovsky and Rafael Pass and Muthuramakrishnan Venkitasubramaniam and Ivan Visconti},
booktitle = {TCC},
pages = {192--216},
doi = {10.1007/978-3-642-54242-8_9},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25303,
title = {On Extractability Obfuscation},
author = {Elette Boyle and Kai-Min Chung and Rafael Pass},
booktitle = {TCC},
pages = {52--73},
doi = {10.1007/978-3-642-54242-8_3},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25304,
title = {Achieving Constant Round Leakage-Resilient Zero-Knowledge},
author = {Omkant Pandey},
booktitle = {TCC},
pages = {146--166},
doi = {10.1007/978-3-642-54242-8_7},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25305,
title = {Leakage Resilient Fully Homomorphic Encryption},
author = {Alexandra Berkoff and Feng-Hao Liu},
booktitle = {TCC},
pages = {515--539},
doi = {10.1007/978-3-642-54242-8_22},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25306,
title = {Non-malleable Coding against Bit-Wise and Split-State Tampering},
author = {Mahdi Cheraghchi and Venkatesan Guruswami},
booktitle = {TCC},
pages = {440--464},
doi = {10.1007/978-3-642-54242-8_19},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25307,
title = {Continuous Non-malleable Codes},
author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi},
booktitle = {TCC},
pages = {465--488},
doi = {10.1007/978-3-642-54242-8_20},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25308,
title = {Lower Bounds in the Hardware Token Model},
author = {Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen},
booktitle = {TCC},
pages = {663--687},
doi = {10.1007/978-3-642-54242-8_28},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25309,
title = {Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol},
author = {Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto},
booktitle = {TCC},
pages = {343--367},
doi = {10.1007/978-3-642-54242-8_15},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25310,
title = {Multi-linear Secret-Sharing Schemes},
author = {Amos Beimel and Aner Ben-Efraim and Carles Padró and Ilya Tyomkin},
booktitle = {TCC},
pages = {394--418},
doi = {10.1007/978-3-642-54242-8_17},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25311,
title = {Statistical Concurrent Non-malleable Zero Knowledge},
author = {Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti},
booktitle = {TCC},
pages = {167--191},
doi = {10.1007/978-3-642-54242-8_8},
publisher = {Springer},
year = {2014}
}
@proceedings{tcc-2014-25312,
title = {Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
booktitle = {TCC},
volume = {8349},
doi = {10.1007/978-3-642-54242-8},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25313,
title = {On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations},
author = {Takahiro Matsuda},
booktitle = {TCC},
pages = {265--290},
doi = {10.1007/978-3-642-54242-8_12},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25314,
title = {(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens},
author = {Seung Geol Choi and Jonathan Katz and Dominique Schr\"oder and Arkady Yerukhimovich and Hong-Sheng Zhou},
booktitle = {TCC},
pages = {638--662},
doi = {10.1007/978-3-642-54242-8_27},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25315,
title = {Probabilistically Checkable Proofs of Proximity with Zero-Knowledge},
author = {Yuval Ishai and Mor Weiss},
booktitle = {TCC},
pages = {121--145},
doi = {10.1007/978-3-642-54242-8_6},
publisher = {Springer},
year = {2014}
}
@inproceedings{tcc-2014-25316,
title = {Towards Characterizing Complete Fairness in Secure Two-Party Computation},
author = {Gilad Asharov},
booktitle = {TCC},
pages = {291--316},
doi = {10.1007/978-3-642-54242-8_13},
publisher = {Springer},
year = {2014}
}
@inproceedings{asiacrypt-2013-24946,
title = {Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter},
author = {Baodong Qin and Shengli Liu},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {381--400},
doi = {10.1007/978-3-642-42045-0_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24947,
title = {Key Difference Invariant Bias in Block Ciphers},
author = {Andrey Bogdanov and Christina Boura and Vincent Rijmen and Meiqin Wang and Long Wen and Jingyuan Zhao},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {357--376},
doi = {10.1007/978-3-642-42033-7_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24948,
title = {Random Projections, Graph Sparsification, and Differential Privacy},
author = {Jalaj Upadhyay},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {276--295},
doi = {10.1007/978-3-642-42033-7_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24949,
title = {Reset Indifferentiability and Its Consequences},
author = {Paul Baecher and Christina Brzuska and Arno Mittelbach},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {154--173},
doi = {10.1007/978-3-642-42033-7_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24950,
title = {Functional Encryption from (Small) Hardware Tokens},
author = {Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {120--139},
doi = {10.1007/978-3-642-42045-0_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24951,
title = {Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency},
author = {Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {235--254},
doi = {10.1007/978-3-642-42033-7_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24952,
title = {Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments},
author = {Dana Dachman-Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {316--336},
doi = {10.1007/978-3-642-42033-7_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24953,
title = {Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests},
author = {Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin W\'ojcik},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {486--505},
doi = {10.1007/978-3-642-42033-7_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24954,
title = {Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters},
author = {Yu Yu and Xiangxue Li and Jian Weng},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {261--279},
doi = {10.1007/978-3-642-42045-0_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24955,
title = {Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique - (Extended Abstract)},
author = {Luís T. A. N. Brandão},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {441--463},
doi = {10.1007/978-3-642-42045-0_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24956,
title = {Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier},
author = {Ivan Damg\r ard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {140--160},
doi = {10.1007/978-3-642-42045-0_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24957,
title = {Function-Private Subspace-Membership Encryption and Its Applications},
author = {Dan Boneh and Ananth Raghunathan and Gil Segev},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {255--275},
doi = {10.1007/978-3-642-42033-7_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24958,
title = {Four-Dimensional GLV via the Weil Restriction},
author = {Aurore Guillevic and Sorina Ionica},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {79--96},
doi = {10.1007/978-3-642-42033-7_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24959,
title = {Generic Key Recovery Attack on Feistel Scheme},
author = {Takanori Isobe and Kyoji Shibutani},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {464--485},
doi = {10.1007/978-3-642-42033-7_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24960,
title = {Computational Fuzzy Extractors},
author = {Benjamin Fuller and Xianrui Meng and Leonid Reyzin},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {174--193},
doi = {10.1007/978-3-642-42033-7_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24961,
title = {How to Construct an Ideal Cipher from a Small Set of Public Permutations},
author = {Rodolphe Lampe and Yannick Seurin},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {444--463},
doi = {10.1007/978-3-642-42033-7_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24962,
title = {Discrete Gaussian Leftover Hash Lemma over Infinite Domains},
author = {Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {97--116},
doi = {10.1007/978-3-642-42033-7_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24963,
title = {Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization},
author = {Joseph M. Renes and Renato Renner and David Sutter},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {194--213},
doi = {10.1007/978-3-642-42033-7_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24964,
title = {Constrained Pseudorandom Functions and Their Applications},
author = {Dan Boneh and Brent Waters},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {280--300},
doi = {10.1007/978-3-642-42045-0_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24965,
title = {Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited},
author = {Sandro Coretti and Ueli Maurer and Björn Tackmann},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {134--153},
doi = {10.1007/978-3-642-42033-7_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24966,
title = {On Diamond Structures and Trojan Message Attacks},
author = {Tuomas Kortelainen and Juha Kortelainen},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {524--539},
doi = {10.1007/978-3-642-42045-0_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24967,
title = {New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography},
author = {Gilles Macario-Rat and Jérôme Plût and Henri Gilbert},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {117--133},
doi = {10.1007/978-3-642-42033-7_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24968,
title = {Unconditionally Secure and Universally Composable Commitments from Physical Assumptions},
author = {Ivan Damg\r ard and Alessandra Scafuro},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {100--119},
doi = {10.1007/978-3-642-42045-0_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24969,
title = {Building Lossy Trapdoor Functions from Lossy Encryption},
author = {Brett Hemenway and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {241--260},
doi = {10.1007/978-3-642-42045-0_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24970,
title = {Lattice-Based Group Signatures with Logarithmic Signature Size},
author = {Fabien Laguillaumie and Adeline Langlois and Beno\^\it Libert and Damien Stehl\'e},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {41--61},
doi = {10.1007/978-3-642-42045-0_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24971,
title = {Cryptanalysis of HMAC/NMAC-Whirlpool},
author = {Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {21--40},
doi = {10.1007/978-3-642-42045-0_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@proceedings{asiacrypt-2013-24972,
title = {Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
doi = {10.1007/978-3-642-42033-7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24973,
title = {Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes},
author = {Helger Lipmaa},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {41--60},
doi = {10.1007/978-3-642-42033-7_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24974,
title = {Parallelizable and Authenticated Online Ciphers},
author = {Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {424--443},
doi = {10.1007/978-3-642-42033-7_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24975,
title = {A Heuristic for Finding Compatible Differential Paths with Application to HAS-160},
author = {Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {464--483},
doi = {10.1007/978-3-642-42045-0_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24976,
title = {Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful},
author = {Mitsugu Iwamoto and Thomas Peyrin and Yu Sasaki},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {504--523},
doi = {10.1007/978-3-642-42045-0_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24977,
title = {A Modular Framework for Building Variable-Input-Length Tweakable Ciphers},
author = {Thomas Shrimpton and R. Seth Terashima},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {405--423},
doi = {10.1007/978-3-642-42033-7_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24978,
title = {SCARE of Secret Ciphers with SPN Structures},
author = {Matthieu Rivain and Thomas Roche},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {526--544},
doi = {10.1007/978-3-642-42033-7_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24979,
title = {Tamper Resilient Circuits: The Adversary at the Gates},
author = {Aggelos Kiayias and Yiannis Tselekounis},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {161--180},
doi = {10.1007/978-3-642-42045-0_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24980,
title = {Between a Rock and a Hard Place: Interpolating between MPC and FHE},
author = {Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {221--240},
doi = {10.1007/978-3-642-42045-0_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24981,
title = {Constant-Round Concurrent Zero Knowledge in the Bounded Player Model},
author = {Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {21--40},
doi = {10.1007/978-3-642-42033-7_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24982,
title = {Fully Homomorphic Message Authenticators},
author = {Rosario Gennaro and Daniel Wichs},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {301--320},
doi = {10.1007/978-3-642-42045-0_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24983,
title = {New Generic Attacks against Hash-Based MACs},
author = {Ga\"etan Leurent and Thomas Peyrin and Lei Wang},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {1--20},
doi = {10.1007/978-3-642-42045-0_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24984,
title = {Fair and Efficient Secure Multiparty Computation with Reputation Systems},
author = {Gilad Asharov and Yehuda Lindell and Hila Zarosim},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {201--220},
doi = {10.1007/978-3-642-42045-0_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24985,
title = {Families of Fast Elliptic Curves from \&\#8474;-curves},
author = {Benjamin Smith},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {61--78},
doi = {10.1007/978-3-642-42033-7_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24986,
title = {Notions of Black-Box Reductions, Revisited},
author = {Paul Baecher and Christina Brzuska and Marc Fischlin},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {296--315},
doi = {10.1007/978-3-642-42033-7_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24987,
title = {SPHF-Friendly Non-interactive Commitments},
author = {Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {214--234},
doi = {10.1007/978-3-642-42033-7_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24988,
title = {Efficient General-Adversary Multi-Party Computation},
author = {Martin Hirt and Daniel Tschudi},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {181--200},
doi = {10.1007/978-3-642-42045-0_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24989,
title = {Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild},
author = {Daniel J. Bernstein and Yun-An Chang and Chen-Mou Cheng and Li-Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {341--360},
doi = {10.1007/978-3-642-42045-0_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24990,
title = {Behind the Scene of Side Channel Attacks},
author = {Victor Lomné and Emmanuel Prouff and Thomas Roche},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {506--525},
doi = {10.1007/978-3-642-42033-7_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24991,
title = {Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2},
author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {337--356},
doi = {10.1007/978-3-642-42033-7_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24992,
title = {Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE},
author = {Shengbao Wu and Hongjun Wu and Tao Huang and Mingsheng Wang and Wenling Wu},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {377--404},
doi = {10.1007/978-3-642-42033-7_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24993,
title = {The Fiat-Shamir Transformation in a Quantum World},
author = {\"Ozg\"ur Dagdelen and Marc Fischlin and Tommaso Gagliardoni},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {62--81},
doi = {10.1007/978-3-642-42045-0_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24994,
title = {On Continual Leakage of Discrete Log Representations},
author = {Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {401--420},
doi = {10.1007/978-3-642-42045-0_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24995,
title = {Improved Cryptanalysis of Reduced RIPEMD-160},
author = {Florian Mendel and Thomas Peyrin and Martin Schl\"affer and Lei Wang and Shuang Wu},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {484--503},
doi = {10.1007/978-3-642-42045-0_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24996,
title = {Naturally Rehearsing Passwords},
author = {Jeremiah Blocki and Manuel Blum and Anupam Datta},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {361--380},
doi = {10.1007/978-3-642-42045-0_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24997,
title = {Hiding the Input-Size in Secure Two-Party Computation},
author = {Yehuda Lindell and Kobbi Nissim and Claudio Orlandi},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {421--440},
doi = {10.1007/978-3-642-42045-0_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24998,
title = {Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces},
author = {Charanjit S. Jutla and Arnab Roy},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8269},
pages = {1--20},
doi = {10.1007/978-3-642-42033-7_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-24999,
title = {Non-uniform Cracks in the Concrete: The Power of Free Precomputation},
author = {Daniel J. Bernstein and Tanja Lange},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {321--340},
doi = {10.1007/978-3-642-42045-0_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{asiacrypt-2013-25000,
title = {On the Security of One-Witness Blind Signature Schemes},
author = {Foteini Baldimtsi and Anna Lysyanskaya},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
pages = {82--99},
doi = {10.1007/978-3-642-42045-0_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@proceedings{asiacrypt-2013-25001,
title = {Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II},
booktitle = {Advances in Cryptology - ASIACRYPT 2013},
volume = {8270},
doi = {10.1007/978-3-642-42045-0},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{ches-2013-24750,
title = {Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults},
author = {Ronan Lashermes and Jacques Fournier and Louis Goubin},
booktitle = {CHES},
pages = {365--382},
doi = {10.1007/978-3-642-40349-1_21},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24751,
title = {Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware},
author = {Begül Bilgin and Andrey Bogdanov and Miroslav Knezevic and Florian Mendel and Qingju Wang},
booktitle = {CHES},
pages = {142--158},
doi = {10.1007/978-3-642-40349-1_9},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24752,
title = {On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs},
author = {Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann},
booktitle = {CHES},
pages = {107--125},
doi = {10.1007/978-3-642-40349-1_7},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24753,
title = {A New Model for Error-Tolerant Side-Channel Cube Attacks},
author = {Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede},
booktitle = {CHES},
pages = {453--470},
doi = {10.1007/978-3-642-40349-1_26},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24754,
title = {Block Ciphers That Are Easier to Mask: How Far Can We Go?},
author = {Beno\^\it G\'erard and Vincent Grosso and Mar\'\ia Naya-Plasencia and Fran\c cois-Xavier Standaert},
booktitle = {CHES},
pages = {383--399},
doi = {10.1007/978-3-642-40349-1_22},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24755,
title = {Leakage-Resilient Symmetric Encryption via Re-keying},
author = {Michel Abdalla and Sonia Belaïd and Pierre-Alain Fouque},
booktitle = {CHES},
pages = {471--488},
doi = {10.1007/978-3-642-40349-1_27},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24756,
title = {On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)},
author = {Amir Moradi and Oliver Mischke},
booktitle = {CHES},
pages = {1--20},
doi = {10.1007/978-3-642-40349-1_1},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24757,
title = {An Accurate Probabilistic Reliability Model for Silicon PUFs},
author = {Roel Maes},
booktitle = {CHES},
pages = {73--89},
doi = {10.1007/978-3-642-40349-1_5},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24758,
title = {Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012},
author = {Arnab Roy and Srinivas Vivek},
booktitle = {CHES},
pages = {417--434},
doi = {10.1007/978-3-642-40349-1_24},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24759,
title = {A Very High Speed True Random Number Generator with Entropy Assessment},
author = {Abdelkarim Cherkaoui and Viktor Fischer and Laurent Fesquet and Alain Aubert},
booktitle = {CHES},
pages = {179--196},
doi = {10.1007/978-3-642-40349-1_11},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24760,
title = {On the Implementation of Unified Arithmetic on Binary Huff Curves},
author = {Santosh Ghosh and Amit Kumar and Amitabh Das and Ingrid Verbauwhede},
booktitle = {CHES},
pages = {349--364},
doi = {10.1007/978-3-642-40349-1_20},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24761,
title = {Masking vs. Multiparty Computation: How Large Is the Gap for AES?},
author = {Vincent Grosso and Fran\c cois-Xavier Standaert and Sebastian Faust},
booktitle = {CHES},
pages = {400--416},
doi = {10.1007/978-3-642-40349-1_23},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24762,
title = {McBits: Fast Constant-Time Code-Based Cryptography},
author = {Daniel J. Bernstein and Tung Chou and Peter Schwabe},
booktitle = {CHES},
pages = {250--272},
doi = {10.1007/978-3-642-40349-1_15},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24763,
title = {Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack},
author = {Adrian Thillard and Emmanuel Prouff and Thomas Roche},
booktitle = {CHES},
pages = {21--36},
doi = {10.1007/978-3-642-40349-1_2},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24764,
title = {Stealthy Dopant-Level Hardware Trojans},
author = {Georg T. Becker and Francesco Regazzoni and Christof Paar and Wayne P. Burleson},
booktitle = {CHES},
pages = {197--214},
doi = {10.1007/978-3-642-40349-1_12},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24765,
title = {Sleuth: Automated Verification of Software Power Analysis Countermeasures},
author = {Ali Galip Bayrak and Francesco Regazzoni and David Novo and Paolo Ienne},
booktitle = {CHES},
pages = {293--310},
doi = {10.1007/978-3-642-40349-1_17},
publisher = {Springer},
year = {2013}
}
@proceedings{ches-2013-24766,
title = {Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
booktitle = {CHES},
volume = {8086},
doi = {10.1007/978-3-642-40349-1},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24767,
title = {A Differential Fault Attack on MICKEY 2.0},
author = {Subhadeep Banik and Subhamoy Maitra},
booktitle = {CHES},
pages = {215--232},
doi = {10.1007/978-3-642-40349-1_13},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24768,
title = {Lambda Coordinates for Binary Elliptic Curves},
author = {Thomaz Oliveira and Julio López and Diego F. Aranha and Francisco Rodr\'\iguez-Henr\'\iquez},
booktitle = {CHES},
pages = {311--330},
doi = {10.1007/978-3-642-40349-1_18},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24769,
title = {A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement},
author = {Mudit Bhargava and Ken Mai},
booktitle = {CHES},
pages = {90--106},
doi = {10.1007/978-3-642-40349-1_6},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24770,
title = {Profiling DPA: Efficacy and Efficiency Trade-Offs},
author = {Carolyn Whitnall and Elisabeth Oswald},
booktitle = {CHES},
pages = {37--54},
doi = {10.1007/978-3-642-40349-1_3},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24771,
title = {Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID},
author = {Peter Pessl and Michael Hutter},
booktitle = {CHES},
pages = {126--141},
doi = {10.1007/978-3-642-40349-1_8},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24772,
title = {Improving Modular Inversion in RNS Using the Plus-Minus Method},
author = {Karim Bigou and Arnaud Tisserand},
booktitle = {CHES},
pages = {233--249},
doi = {10.1007/978-3-642-40349-1_14},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24773,
title = {On Measurable Side-Channel Leaks Inside ASIC Design Primitives},
author = {Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino},
booktitle = {CHES},
pages = {159--178},
doi = {10.1007/978-3-642-40349-1_10},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24774,
title = {High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition},
author = {Joppe W. Bos and Craig Costello and H\"useyin Hisil and Kristin Lauter},
booktitle = {CHES},
pages = {331--348},
doi = {10.1007/978-3-642-40349-1_19},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24775,
title = {Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA},
author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson},
booktitle = {CHES},
pages = {435--452},
doi = {10.1007/978-3-642-40349-1_25},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24776,
title = {Non-invasive Spoofing Attacks for Anti-lock Braking Systems},
author = {Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava},
booktitle = {CHES},
pages = {55--72},
doi = {10.1007/978-3-642-40349-1_4},
publisher = {Springer},
year = {2013}
}
@inproceedings{ches-2013-24777,
title = {Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices},
author = {Stefan Heyse and Ingo von Maurich and Tim Güneysu},
booktitle = {CHES},
pages = {273--292},
doi = {10.1007/978-3-642-40349-1_16},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24598,
title = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries},
author = {David Cash and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel-Catalin Rosu and Michael Steiner},
booktitle = {CRYPTO},
pages = {353--373},
doi = {10.1007/978-3-642-40041-4_20},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24599,
title = {Time-Optimal Interactive Proofs for Circuit Evaluation},
author = {Justin Thaler},
booktitle = {CRYPTO},
pages = {71--89},
doi = {10.1007/978-3-642-40084-1_5},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24600,
title = {Attribute-Based Encryption for Circuits from Multilinear Maps},
author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters},
booktitle = {CRYPTO},
pages = {479--499},
doi = {10.1007/978-3-642-40084-1_27},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24601,
title = {New Techniques for SPHFs and Efficient One-Round PAKE Protocols},
author = {Fabrice Benhamouda and Olivier Blazy and C\'eline Chevalier and David Pointcheval and Damien Vergnaud},
booktitle = {CRYPTO},
pages = {449--475},
doi = {10.1007/978-3-642-40041-4_25},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24602,
title = {On the Function Field Sieve and the Impact of Higher Splitting Probabilities},
author = {Faruk Göloglu and Robert Granger and Gary McGuire and Jens Zumbrägel},
booktitle = {CRYPTO},
pages = {109--128},
doi = {10.1007/978-3-642-40084-1_7},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24603,
title = {Improved OT Extension for Transferring Short Secrets},
author = {Vladimir Kolesnikov and Ranjit Kumaresan},
booktitle = {CRYPTO},
pages = {54--70},
doi = {10.1007/978-3-642-40084-1_4},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24604,
title = {On Fair Exchange, Fair Coins and Fair Sampling},
author = {Shashank Agrawal and Manoj Prabhakaran},
booktitle = {CRYPTO},
pages = {259--276},
doi = {10.1007/978-3-642-40041-4_15},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24605,
title = {Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose},
author = {Yan Huang and Jonathan Katz and David Evans},
booktitle = {CRYPTO},
pages = {18--35},
doi = {10.1007/978-3-642-40084-1_2},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24606,
title = {Instantiating Random Oracles via UCEs},
author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi},
booktitle = {CRYPTO},
pages = {398--415},
doi = {10.1007/978-3-642-40084-1_23},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24607,
title = {Limits of Provable Security for Homomorphic Encryption},
author = {Andrej Bogdanov and Chin Ho Lee},
booktitle = {CRYPTO},
pages = {111--128},
doi = {10.1007/978-3-642-40041-4_7},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24608,
title = {Hardness of SIS and LWE with Small Parameters},
author = {Daniele Micciancio and Chris Peikert},
booktitle = {CRYPTO},
pages = {21--39},
doi = {10.1007/978-3-642-40041-4_2},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24609,
title = {Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols},
author = {Vipul Goyal and Ilya Mironov and Omkant Pandey and Amit Sahai},
booktitle = {CRYPTO},
pages = {298--315},
doi = {10.1007/978-3-642-40041-4_17},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24610,
title = {Fully, (Almost) Tightly Secure IBE and Dual System Groups},
author = {Jie Chen and Hoeteck Wee},
booktitle = {CRYPTO},
pages = {435--460},
doi = {10.1007/978-3-642-40084-1_25},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24611,
title = {Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption},
author = {Dan Boneh and Ananth Raghunathan and Gil Segev},
booktitle = {CRYPTO},
pages = {461--478},
doi = {10.1007/978-3-642-40084-1_26},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24612,
title = {Non-malleable Codes from Two-Source Extractors},
author = {Stefan Dziembowski and Tomasz Kazana and Maciej Obremski},
booktitle = {CRYPTO},
pages = {239--257},
doi = {10.1007/978-3-642-40084-1_14},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24613,
title = {Bounds in Shallows and in Miseries},
author = {C\'eline Blondeau and Andrey Bogdanov and Gregor Leander},
booktitle = {CRYPTO},
pages = {204--221},
doi = {10.1007/978-3-642-40041-4_12},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24614,
title = {Message-Locked Encryption for Lock-Dependent Messages},
author = {Mart\'\in Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev},
booktitle = {CRYPTO},
pages = {374--391},
doi = {10.1007/978-3-642-40041-4_21},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24615,
title = {Lattice Signatures and Bimodal Gaussians},
author = {Léo Ducas and Alain Durmus and Tancr\`ede Lepoint and Vadim Lyubashevsky},
booktitle = {CRYPTO},
pages = {40--56},
doi = {10.1007/978-3-642-40041-4_3},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24616,
title = {Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields},
author = {Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Skeith III},
booktitle = {CRYPTO},
pages = {148--165},
doi = {10.1007/978-3-642-40084-1_9},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24617,
title = {Secure Computation against Adaptive Auxiliary Information},
author = {Elette Boyle and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai and Amit Sahai},
booktitle = {CRYPTO},
pages = {316--334},
doi = {10.1007/978-3-642-40041-4_18},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24618,
title = {Secret Sharing, Rank Inequalities and Information Inequalities},
author = {Sebasti\`a Mart\'\in Mollev\'\i and Carles Padr\'o and An Yang},
booktitle = {CRYPTO},
pages = {277--288},
doi = {10.1007/978-3-642-40084-1_16},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24619,
title = {Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128},
author = {Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin},
booktitle = {CRYPTO},
pages = {183--203},
doi = {10.1007/978-3-642-40041-4_11},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24620,
title = {Limits on the Power of Cryptographic Cheap Talk},
author = {Pavel Hubácek and Jesper Buus Nielsen and Alon Rosen},
booktitle = {CRYPTO},
pages = {277--297},
doi = {10.1007/978-3-642-40041-4_16},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24621,
title = {Obfuscating Conjunctions},
author = {Zvika Brakerski and Guy N. Rothblum},
booktitle = {CRYPTO},
pages = {416--434},
doi = {10.1007/978-3-642-40084-1_24},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24622,
title = {Everlasting Multi-party Computation},
author = {Dominique Unruh},
booktitle = {CRYPTO},
pages = {380--397},
doi = {10.1007/978-3-642-40084-1_22},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24623,
title = {On the Security of the TLS Protocol: A Systematic Analysis},
author = {Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee},
booktitle = {CRYPTO},
pages = {429--448},
doi = {10.1007/978-3-642-40041-4_24},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24624,
title = {Programmable Hash Functions in the Multilinear Setting},
author = {Eduarda S. V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks},
booktitle = {CRYPTO},
pages = {513--530},
doi = {10.1007/978-3-642-40041-4_28},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24625,
title = {Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling},
author = {Fr\'ed\'eric Dupuis and Omar Fawzi and Stephanie Wehner},
booktitle = {CRYPTO},
pages = {326--343},
doi = {10.1007/978-3-642-40084-1_19},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24626,
title = {An Algebraic Framework for Diffie-Hellman Assumptions},
author = {Alex Escala and Gottfried Herold and Eike Kiltz and Carla R\`afols and Jorge Villar},
booktitle = {CRYPTO},
pages = {129--147},
doi = {10.1007/978-3-642-40084-1_8},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24627,
title = {What Information Is Leaked under Concurrent Composition?},
author = {Vipul Goyal and Divya Gupta and Abhishek Jain},
booktitle = {CRYPTO},
pages = {220--238},
doi = {10.1007/978-3-642-40084-1_13},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24628,
title = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures},
author = {Susan Hohenberger and Amit Sahai and Brent Waters},
booktitle = {CRYPTO},
pages = {494--512},
doi = {10.1007/978-3-642-40041-4_27},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24629,
title = {Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions},
author = {Fran\c cois-Xavier Standaert and Olivier Pereira and Yu Yu},
booktitle = {CRYPTO},
pages = {335--352},
doi = {10.1007/978-3-642-40041-4_19},
publisher = {Springer},
year = {2013}
}
@proceedings{crypto-2013-24630,
title = {Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I},
booktitle = {CRYPTO},
volume = {8042},
doi = {10.1007/978-3-642-40041-4},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24631,
title = {The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries},
author = {Thomas Ristenpart and Scott Yilek},
booktitle = {CRYPTO},
pages = {392--409},
doi = {10.1007/978-3-642-40041-4_22},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24632,
title = {Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation},
author = {Payman Mohassel and Ben Riva},
booktitle = {CRYPTO},
pages = {36--53},
doi = {10.1007/978-3-642-40084-1_3},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24633,
title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based},
author = {Craig Gentry and Amit Sahai and Brent Waters},
booktitle = {CRYPTO},
pages = {75--92},
doi = {10.1007/978-3-642-40041-4_5},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24634,
title = {Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs},
author = {Vadim Lyubashevsky and Daniel Masny},
booktitle = {CRYPTO},
pages = {308--325},
doi = {10.1007/978-3-642-40084-1_18},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24635,
title = {Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys},
author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters},
booktitle = {CRYPTO},
pages = {166--184},
doi = {10.1007/978-3-642-40084-1_10},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24636,
title = {A Uniform Min-Max Theorem with Applications in Cryptography},
author = {Salil P. Vadhan and Colin Jia Zheng},
booktitle = {CRYPTO},
pages = {93--110},
doi = {10.1007/978-3-642-40041-4_6},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24637,
title = {Key Homomorphic PRFs and Their Applications},
author = {Dan Boneh and Kevin Lewi and Hart William Montgomery and Ananth Raghunathan},
booktitle = {CRYPTO},
pages = {410--428},
doi = {10.1007/978-3-642-40041-4_23},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24638,
title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications},
author = {Beno\^\it Libert and Thomas Peters and Marc Joye and Moti Yung},
booktitle = {CRYPTO},
pages = {289--307},
doi = {10.1007/978-3-642-40084-1_17},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24639,
title = {Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions},
author = {Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy},
booktitle = {CRYPTO},
pages = {571--588},
doi = {10.1007/978-3-642-40041-4_31},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24640,
title = {Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract)},
author = {Bin Zhang 0003 and Chao Xu and Dengguo Feng},
booktitle = {CRYPTO},
pages = {165--182},
doi = {10.1007/978-3-642-40041-4_10},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24641,
title = {On the Achievability of Simulation-Based Security for Functional Encryption},
author = {Angelo De Caro and Vincenzo Iovino and Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano},
booktitle = {CRYPTO},
pages = {519--535},
doi = {10.1007/978-3-642-40084-1_29},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24642,
title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract)},
author = {Gil Cohen and Ivan Damg\r ard and Yuval Ishai and Jonas Kölker and Peter Bro Miltersen and Ran Raz and Ron D. Rothblum},
booktitle = {CRYPTO},
pages = {185--202},
doi = {10.1007/978-3-642-40084-1_11},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24643,
title = {Counter-cryptanalysis: reconstructing Flame's new variant collision attack},
author = {Marc Stevens},
booktitle = {CRYPTO},
pages = {129--146},
doi = {10.1007/978-3-642-40041-4_8},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24644,
title = {SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge},
author = {Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza},
booktitle = {CRYPTO},
pages = {90--108},
doi = {10.1007/978-3-642-40084-1_6},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24645,
title = {Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries},
author = {Yehuda Lindell},
booktitle = {CRYPTO},
pages = {1--17},
doi = {10.1007/978-3-642-40084-1_1},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24646,
title = {Optimal Coding for Streaming Authentication and Interactive Communication},
author = {Matthew K. Franklin and Ran Gelles and Rafail Ostrovsky and Leonard J. Schulman},
booktitle = {CRYPTO},
pages = {258--276},
doi = {10.1007/978-3-642-40084-1_15},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24647,
title = {Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System},
author = {Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David Oswald and Falk Schellenberg and Christof Paar},
booktitle = {CRYPTO},
pages = {147--164},
doi = {10.1007/978-3-642-40041-4_9},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24648,
title = {Functional Encryption: New Perspectives and Lower Bounds},
author = {Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee},
booktitle = {CRYPTO},
pages = {500--518},
doi = {10.1007/978-3-642-40084-1_28},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24649,
title = {On the Indifferentiability of Key-Alternating Ciphers},
author = {Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger},
booktitle = {CRYPTO},
pages = {531--550},
doi = {10.1007/978-3-642-40041-4_29},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24650,
title = {Construction of Differential Characteristics in ARX Designs Application to Skein},
author = {Ga\"etan Leurent},
booktitle = {CRYPTO},
pages = {241--258},
doi = {10.1007/978-3-642-40041-4_14},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24651,
title = {Practical Bootstrapping in Quasilinear Time},
author = {Jacob Alperin-Sheriff and Chris Peikert},
booktitle = {CRYPTO},
pages = {1--20},
doi = {10.1007/978-3-642-40041-4_1},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24652,
title = {Quantum One-Time Programs - (Extended Abstract)},
author = {Anne Broadbent and Gus Gutoski and Douglas Stebila},
booktitle = {CRYPTO},
pages = {344--360},
doi = {10.1007/978-3-642-40084-1_20},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24653,
title = {A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation},
author = {Martin Hirt and Christoph Lucas and Ueli M. Maurer},
booktitle = {CRYPTO},
pages = {203--219},
doi = {10.1007/978-3-642-40084-1_12},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24654,
title = {Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World},
author = {Dan Boneh and Mark Zhandry},
booktitle = {CRYPTO},
pages = {361--379},
doi = {10.1007/978-3-642-40084-1_21},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24655,
title = {Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers},
author = {Peter Gazi},
booktitle = {CRYPTO},
pages = {551--570},
doi = {10.1007/978-3-642-40041-4_30},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24656,
title = {Sieve-in-the-Middle: Improved MITM Attacks},
author = {Anne Canteaut and Mar\'\ia Naya-Plasencia and Bastien Vayssière},
booktitle = {CRYPTO},
pages = {222--240},
doi = {10.1007/978-3-642-40041-4_13},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24657,
title = {Practical Multilinear Maps over the Integers},
author = {Jean-S\'ebastien Coron and Tancr\`ede Lepoint and Mehdi Tibouchi},
booktitle = {CRYPTO},
pages = {476--493},
doi = {10.1007/978-3-642-40041-4_26},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24658,
title = {Learning with Rounding, Revisited - New Reduction, Properties and Applications},
author = {Jo\"el Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs},
booktitle = {CRYPTO},
pages = {57--74},
doi = {10.1007/978-3-642-40041-4_4},
publisher = {Springer},
year = {2013}
}
@proceedings{crypto-2013-24659,
title = {Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II},
booktitle = {CRYPTO},
volume = {8043},
doi = {10.1007/978-3-642-40084-1},
publisher = {Springer},
year = {2013}
}
@inproceedings{crypto-2013-24660,
title = {How to Run Turing Machines on Encrypted Data},
author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich},
booktitle = {CRYPTO},
pages = {536--553},
doi = {10.1007/978-3-642-40084-1_30},
publisher = {Springer},
year = {2013}
}
@inproceedings{eurocrypt-2013-25002,
title = {Locally Computable UOWHF with Linear Shrinkage},
author = {Benny Applebaum and Yoni Moses},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {486--502},
doi = {10.1007/978-3-642-38348-9_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25003,
title = {Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists},
author = {Stephanie Bayer and Jens Groth},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {646--663},
doi = {10.1007/978-3-642-38348-9_38},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25004,
title = {Regularity of Lossy RSA on Subdomains and Its Applications},
author = {Mark Lewko and Adam O'Neill and Adam Smith},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {55--75},
doi = {10.1007/978-3-642-38348-9_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25005,
title = {Candidate Multilinear Maps from Ideal Lattices},
author = {Sanjam Garg and Craig Gentry and Shai Halevi},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {1--17},
doi = {10.1007/978-3-642-38348-9_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25006,
title = {How to Garble RAM Programs},
author = {Steve Lu and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {719--734},
doi = {10.1007/978-3-642-38348-9_42},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25007,
title = {MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions},
author = {Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {537--556},
doi = {10.1007/978-3-642-38348-9_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25008,
title = {Amplification of Chosen-Ciphertext Security},
author = {Huijia Lin and Stefano Tessaro},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {503--519},
doi = {10.1007/978-3-642-38348-9_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25009,
title = {Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions},
author = {Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {426--443},
doi = {10.1007/978-3-642-38348-9_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25010,
title = {Practical Homomorphic MACs for Arithmetic Circuits},
author = {Dario Catalano and Dario Fiore},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {336--352},
doi = {10.1007/978-3-642-38348-9_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25011,
title = {Streaming Authenticated Data Structures},
author = {Charalampos Papamanthou and Elaine Shi and Roberto Tamassia and Ke Yi},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {353--370},
doi = {10.1007/978-3-642-38348-9_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25012,
title = {Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields},
author = {Antoine Joux},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {177--193},
doi = {10.1007/978-3-642-38348-9_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25013,
title = {How to Watermark Cryptographic Functions},
author = {Ryo Nishimaki},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {111--125},
doi = {10.1007/978-3-642-38348-9_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25014,
title = {Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption},
author = {Jooyoung Lee},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {405--425},
doi = {10.1007/978-3-642-38348-9_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25015,
title = {Practical Signatures from Standard Assumptions},
author = {Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Jae Hong Seo and Christoph Striecks},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {461--485},
doi = {10.1007/978-3-642-38348-9_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25016,
title = {Message-Locked Encryption and Secure Deduplication},
author = {Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {296--312},
doi = {10.1007/978-3-642-38348-9_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25017,
title = {Improving Local Collisions: New Attacks on Reduced SHA-256},
author = {Florian Mendel and Tomislav Nad and Martin Schl\"affer},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {262--278},
doi = {10.1007/978-3-642-38348-9_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25018,
title = {Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions},
author = {Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti and Akshay Wadia},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {702--718},
doi = {10.1007/978-3-642-38348-9_41},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25019,
title = {Circular Chosen-Ciphertext Security with Compact Ciphertexts},
author = {Dennis Hofheinz},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {520--536},
doi = {10.1007/978-3-642-38348-9_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25020,
title = {Efficient Cryptosystems from 2^{ k }-th Power Residue Symbols},
author = {Marc Joye and Beno\^\it Libert},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {76--92},
doi = {10.1007/978-3-642-38348-9_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25021,
title = {Graph-Theoretic Algorithms for the 'Isomorphism of Polynomials' Problem},
author = {Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {211--227},
doi = {10.1007/978-3-642-38348-9_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25022,
title = {Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions},
author = {Ananth Raghunathan and Gil Segev and Salil P. Vadhan},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {93--110},
doi = {10.1007/978-3-642-38348-9_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25023,
title = {A Toolkit for Ring-LWE Cryptography},
author = {Vadim Lyubashevsky and Chris Peikert and Oded Regev},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {35--54},
doi = {10.1007/978-3-642-38348-9_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@proceedings{eurocrypt-2013-25024,
title = {Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
doi = {10.1007/978-3-642-38348-9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25025,
title = {Dynamic Proofs of Retrievability via Oblivious RAM},
author = {David Cash and Alptekin Küpçü and Daniel Wichs},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {279--295},
doi = {10.1007/978-3-642-38348-9_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25026,
title = {Keccak},
author = {Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {313--314},
doi = {10.1007/978-3-642-38348-9_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25027,
title = {Masking against Side-Channel Attacks: A Formal Security Proof},
author = {Emmanuel Prouff and Matthieu Rivain},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {142--159},
doi = {10.1007/978-3-642-38348-9_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25028,
title = {New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis},
author = {Marc Stevens},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {245--261},
doi = {10.1007/978-3-642-38348-9_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25029,
title = {One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games},
author = {Marco Tomamichel and Serge Fehr and Jedrzej Kaniewski and Stephanie Wehner},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {609--625},
doi = {10.1007/978-3-642-38348-9_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25030,
title = {Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction},
author = {S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {575--591},
doi = {10.1007/978-3-642-38348-9_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25031,
title = {Resource-Restricted Indifferentiability},
author = {Gregory Demay and Peter Gazi and Martin Hirt and Ueli Maurer},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {664--683},
doi = {10.1007/978-3-642-38348-9_39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25032,
title = {Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures},
author = {Marc Fischlin and Nils Fleischhacker},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {444--460},
doi = {10.1007/978-3-642-38348-9_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25033,
title = {How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation},
author = {Payman Mohassel and Seyed Saeed Sadeghian},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {557--574},
doi = {10.1007/978-3-642-38348-9_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25034,
title = {Lossy Codes and a New Variant of the Learning-With-Errors Problem},
author = {Nico D\"ottling and J\"orn M\"uller-Quade},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {18--34},
doi = {10.1007/978-3-642-38348-9_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25035,
title = {Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting},
author = {Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {371--387},
doi = {10.1007/978-3-642-38348-9_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25036,
title = {On Concurrently Secure Computation in the Multiple Ideal Query Model},
author = {Vipul Goyal and Abhishek Jain},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {684--701},
doi = {10.1007/978-3-642-38348-9_40},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25037,
title = {Fast Cryptography in Genus 2},
author = {Joppe W. Bos and Craig Costello and Hüseyin Hisil and Kristin Lauter},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {194--210},
doi = {10.1007/978-3-642-38348-9_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25038,
title = {Batch Fully Homomorphic Encryption over the Integers},
author = {Jung Hee Cheon and Jean-S\'ebastien Coron and Jinsu Kim and Moon Sung Lee and Tancr\`ede Lepoint and Mehdi Tibouchi and Aaram Yun},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {315--335},
doi = {10.1007/978-3-642-38348-9_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25039,
title = {Cryptanalysis of Full RIPEMD-128},
author = {Franck Landelle and Thomas Peyrin},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {228--244},
doi = {10.1007/978-3-642-38348-9_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25040,
title = {Leakage-Resilient Cryptography from Minimal Assumptions},
author = {Carmit Hazay and Adriana López-Alt and Hoeteck Wee and Daniel Wichs},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {160--176},
doi = {10.1007/978-3-642-38348-9_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25041,
title = {Quantum-Secure Message Authentication Codes},
author = {Dan Boneh and Mark Zhandry},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {592--608},
doi = {10.1007/978-3-642-38348-9_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25042,
title = {New Links between Differential and Linear Cryptanalysis},
author = {C\'eline Blondeau and Kaisa Nyberg},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {388--404},
doi = {10.1007/978-3-642-38348-9_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25043,
title = {Quadratic Span Programs and Succinct NIZKs without PCPs},
author = {Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {626--645},
doi = {10.1007/978-3-642-38348-9_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{eurocrypt-2013-25044,
title = {Security Evaluations beyond Computing Power},
author = {Nicolas Veyrat-Charvillon and Beno\^\it G\'erard and Fran\c cois-Xavier Standaert},
booktitle = {Advances in Cryptology - EUROCRYPT 2013},
volume = {7881},
pages = {126--141},
doi = {10.1007/978-3-642-38348-9_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2013}
}
@inproceedings{fse-2013-25045,
title = {Higher-Order Side Channel Security and Mask Refreshing},
author = {Jean-S\'ebastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche},
booktitle = {FSE},
pages = {410--424},
doi = {10.1007/978-3-662-43933-3_21},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25046,
title = {Towards Understanding the Known-Key Security of Block Ciphers},
author = {Elena Andreeva and Andrey Bogdanov and Bart Mennink},
booktitle = {FSE},
pages = {348--366},
doi = {10.1007/978-3-662-43933-3_18},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25047,
title = {Rotational Cryptanalysis of Round-Reduced Keccak},
author = {Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny},
booktitle = {FSE},
pages = {241--262},
doi = {10.1007/978-3-662-43933-3_13},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25048,
title = {Full Plaintext Recovery Attack on Broadcast RC4},
author = {Takanori Isobe and Toshihiro Ohigashi and Yuhei Watanabe and Masakatu Morii},
booktitle = {FSE},
pages = {179--202},
doi = {10.1007/978-3-662-43933-3_10},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25049,
title = {Exhausting Demirci-Sel\çuk Meet-in-the-Middle Attacks Against Reduced-Round AES},
author = {Patrick Derbez and Pierre-Alain Fouque},
booktitle = {FSE},
pages = {541--560},
doi = {10.1007/978-3-662-43933-3_28},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25050,
title = {Time-Memory Trade-Offs for Near-Collisions},
author = {Ga\"etan Leurent},
booktitle = {FSE},
pages = {205--218},
doi = {10.1007/978-3-662-43933-3_11},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25051,
title = {A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox},
author = {Christina Boura and Anne Canteaut},
booktitle = {FSE},
pages = {585--604},
doi = {10.1007/978-3-662-43933-3_30},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25052,
title = {Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller},
author = {Mitsuru Matsui and Yumiko Murakami},
booktitle = {FSE},
pages = {393--409},
doi = {10.1007/978-3-662-43933-3_20},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25053,
title = {Attacks and Security Proofs of EAX-Prime},
author = {Kazuhiko Minematsu and Stefan Lucks and Hiraku Morita and Tetsu Iwata},
booktitle = {FSE},
pages = {327--347},
doi = {10.1007/978-3-662-43933-3_17},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25054,
title = {Smashing WEP in a Passive Attack},
author = {Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux},
booktitle = {FSE},
pages = {155--178},
doi = {10.1007/978-3-662-43933-3_9},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25055,
title = {Tweakable Blockciphers with Asymptotically Optimal Security},
author = {Rodolphe Lampe and Yannick Seurin},
booktitle = {FSE},
pages = {133--151},
doi = {10.1007/978-3-662-43933-3_8},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25056,
title = {Near Collision Attack on the Grain v1 Stream Cipher},
author = {Bin Zhang 0003 and Zhenqi Li and Dengguo Feng and Dongdai Lin},
booktitle = {FSE},
pages = {518--538},
doi = {10.1007/978-3-662-43933-3_27},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25057,
title = {Cryptanalysis of WIDEA},
author = {Ga\"etan Leurent},
booktitle = {FSE},
pages = {39--51},
doi = {10.1007/978-3-662-43933-3_3},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25058,
title = {Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks},
author = {Pierre-Alain Fouque and Thomas Vannet},
booktitle = {FSE},
pages = {502--517},
doi = {10.1007/978-3-662-43933-3_26},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25059,
title = {Towards Secure Distance Bounding},
author = {Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay},
booktitle = {FSE},
pages = {55--67},
doi = {10.1007/978-3-662-43933-3_4},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25060,
title = {Complementing Feistel Ciphers},
author = {Alex Biryukov and Ivica Nikolic},
booktitle = {FSE},
pages = {3--18},
doi = {10.1007/978-3-662-43933-3_1},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25061,
title = {Secure Message Authentication Against Related-Key Attack},
author = {Rishiraj Bhattacharyya and Arnab Roy},
booktitle = {FSE},
pages = {305--324},
doi = {10.1007/978-3-662-43933-3_16},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25062,
title = {ALE: AES-Based Lightweight Authenticated Encryption},
author = {Andrey Bogdanov and Florian Mendel and Francesco Regazzoni and Vincent Rijmen and Elmar Tischhauser},
booktitle = {FSE},
pages = {447--466},
doi = {10.1007/978-3-662-43933-3_23},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25063,
title = {Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256},
author = {Hongbo Yu and Jiazhe Chen and Xiaoyun Wang},
booktitle = {FSE},
pages = {263--283},
doi = {10.1007/978-3-662-43933-3_14},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25064,
title = {A Framework for Automated Independent-Biclique Cryptanalysis},
author = {Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel},
booktitle = {FSE},
pages = {561--581},
doi = {10.1007/978-3-662-43933-3_29},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25065,
title = {Cryptanalysis of Round-Reduced \mathttLED},
author = {Ivica Nikolic and Lei Wang and Shuang Wu},
booktitle = {FSE},
pages = {112--129},
doi = {10.1007/978-3-662-43933-3_7},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25066,
title = {Reflection Cryptanalysis of PRINCE-Like Ciphers},
author = {Hadi Soleimany and C\'eline Blondeau and Xiaoli Yu and Wenling Wu and Kaisa Nyberg and Huiling Zhang and Lei Zhang and Yanfeng Wang},
booktitle = {FSE},
pages = {71--91},
doi = {10.1007/978-3-662-43933-3_5},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25067,
title = {Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials},
author = {Itai Dinur and Orr Dunkelman and Adi Shamir},
booktitle = {FSE},
pages = {219--240},
doi = {10.1007/978-3-662-43933-3_12},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25068,
title = {Security Analysis of PRINCE},
author = {Jérémy Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu},
booktitle = {FSE},
pages = {92--111},
doi = {10.1007/978-3-662-43933-3_6},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25069,
title = {Masking Tables - An Underestimated Security Risk},
author = {Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald},
booktitle = {FSE},
pages = {425--444},
doi = {10.1007/978-3-662-43933-3_22},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25070,
title = {Related-Key Attacks Against Full Hummingbird-2},
author = {Markku-Juhani Olavi Saarinen},
booktitle = {FSE},
pages = {467--482},
doi = {10.1007/978-3-662-43933-3_24},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25071,
title = {A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones},
author = {Ruilin Li and Heng Li and Chao Li and Bing Sun},
booktitle = {FSE},
pages = {485--501},
doi = {10.1007/978-3-662-43933-3_25},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25072,
title = {On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes},
author = {Gordon Procter and Carlos Cid},
booktitle = {FSE},
pages = {287--304},
doi = {10.1007/978-3-662-43933-3_15},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25073,
title = {On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2},
author = {Andrey Bogdanov and Elmar Tischhauser},
booktitle = {FSE},
pages = {19--38},
doi = {10.1007/978-3-662-43933-3_2},
publisher = {Springer},
year = {2013}
}
@inproceedings{fse-2013-25074,
title = {On Symmetric Encryption with Distinguishable Decryption Failures},
author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam},
booktitle = {FSE},
pages = {367--390},
doi = {10.1007/978-3-662-43933-3_19},
publisher = {Springer},
year = {2013}
}
@inproceedings{PKC-2013-24486,
title = {Packed Ciphertexts in LWE-based Homomorphic Encryption},
author = {Zvika Brakerski and Craig Gentry and Shai Halevi},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {1},
doi = {10.1007/978-3-642-36362-7_1},
year = {2013}
}
@inproceedings{PKC-2013-24487,
title = {Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption},
author = {Jonathan Katz and Aishwarya Thiruvengadam and Hong Sheng Zhou},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {14},
doi = {10.1007/978-3-642-36362-7_2},
year = {2013}
}
@inproceedings{PKC-2013-24488,
title = {Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption},
author = {Keita Emura and Goichiro Hanaoka and Takahiro Matsuda and Go Ohtake and Shota Yamada},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {32},
doi = {10.1007/978-3-642-36362-7_3},
year = {2013}
}
@inproceedings{PKC-2013-24489,
title = {Functional Encryption: Origins and Recent Developments},
author = {Brent Waters},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {50},
doi = {10.1007/978-3-642-36362-7_4},
year = {2013}
}
@inproceedings{PKC-2013-24490,
title = {Vector Commitments and their Applications},
author = {Dario Catalano and Dario Fiore},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {54},
doi = {10.1007/978-3-642-36362-7_5},
year = {2013}
}
@inproceedings{PKC-2013-24491,
title = {Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS},
author = {Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong-Sheng Zhou},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {72},
doi = {10.1007/978-3-642-36362-7_6},
year = {2013}
}
@inproceedings{PKC-2013-24492,
title = {Cryptography Using CAPTCHA Puzzles},
author = {Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {89},
doi = {10.1007/978-3-642-36362-7_7},
year = {2013}
}
@inproceedings{PKC-2013-24493,
title = {Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications},
author = {San Ling and Khoa Nguyen and Damien Stehl\'e and Huaxiong Wang},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {106},
doi = {10.1007/978-3-642-36362-7_8},
year = {2013}
}
@inproceedings{PKC-2013-24494,
title = {Decentralized Attribute-Based Signatures},
author = {Tatsuaki Okamoto and Katsuyuki Takashima},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {124},
doi = {10.1007/978-3-642-36362-7_9},
year = {2013}
}
@inproceedings{PKC-2013-24495,
title = {On the semantic security of functional encryption schemes},
author = {Manuel Barbosa and Pooya Farshim},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {142},
doi = {10.1007/978-3-642-36362-7_10},
year = {2013}
}
@inproceedings{PKC-2013-24496,
title = {Attribute-Based Encryption with Fast Decryption},
author = {Susan Hohenberger and Brent Waters},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {160},
doi = {10.1007/978-3-642-36362-7_11},
year = {2013}
}
@inproceedings{PKC-2013-24497,
title = {Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors},
author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {177},
doi = {10.1007/978-3-642-36362-7_12},
year = {2013}
}
@inproceedings{PKC-2013-24498,
title = {Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public ?},
author = {Guillaume Barbu and Alberto Battistello and Guillaume Dabosville and Christophe Giraud and Gu\~A\textcopyrightna\~A\guillemotleftl Renault and Soline Renner and Rina Zeitoun},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {195},
doi = {10.1007/978-3-642-36362-7_13},
year = {2013}
}
@inproceedings{PKC-2013-24499,
title = {Revocable Identity-Based Encryption Revisited: Security Model and Construction},
author = {Jae Hong Seo and Keita Emura},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {213},
doi = {10.1007/978-3-642-36362-7_14},
year = {2013}
}
@inproceedings{PKC-2013-24500,
title = {Improved (Hierarchical) Inner-Product Encryption from Lattices},
author = {Keita Xagawa},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {231},
doi = {10.1007/978-3-642-36362-7_15},
year = {2013}
}
@inproceedings{PKC-2013-24501,
title = {Non-Interactive Key Exchange},
author = {Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {249},
doi = {10.1007/978-3-642-36362-7_17},
year = {2013}
}
@inproceedings{PKC-2013-24502,
title = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages},
author = {Fabrice Benhamouda and Olivier Blazy and C\'eline Chevalier and David Pointcheval and Damien Vergnaud},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {267},
doi = {10.1007/978-3-642-36362-7_18},
year = {2013}
}
@inproceedings{PKC-2013-24503,
title = {Tighter Reductions for Forward-Secure Signature Schemes},
author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {287},
doi = {10.1007/978-3-642-36362-7_19},
year = {2013}
}
@inproceedings{PKC-2013-24504,
title = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size},
author = {Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {307},
doi = {10.1007/978-3-642-36362-7_20},
year = {2013}
}
@inproceedings{PKC-2013-24505,
title = {Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures},
author = {Nuttapong Attrapadung and Beno\^\it Libert and Thomas Peters},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {327},
doi = {10.1007/978-3-642-36362-7_24},
year = {2013}
}
@inproceedings{PKC-2013-24506,
title = {Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES},
author = {Ryo Nishimaki and Keita Xagawa},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {345},
doi = {10.1007/978-3-642-36362-7_25},
year = {2013}
}
@inproceedings{PKC-2013-24507,
title = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies},
author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {365},
doi = {10.1007/978-3-642-36362-7_26},
year = {2013}
}
@inproceedings{PKC-2013-24508,
title = {New Constructions and Applications of Trapdoor DDH Groups},
author = {Yannick Seurin},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {385},
doi = {10.1007/978-3-642-36362-7_27},
year = {2013}
}
@inproceedings{PKC-2013-24509,
title = {Techniques for Efficient Secure Computation Based on Yao's Protocol},
author = {Yehuda Lindell},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {403},
doi = {10.1007/978-3-642-36362-7_16},
year = {2013}
}
@inproceedings{PKC-2013-24510,
title = {Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited},
author = {Takahiro Matsuda and Goichiro Hanaoka},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {404},
doi = {10.1007/978-3-642-36362-7_21},
year = {2013}
}
@inproceedings{PKC-2013-24511,
title = {Robust Encryption, Revisited},
author = {Pooya Farshim and Beno\^\it Libert and Kenneth G. Paterson and Elizabeth A. Quaglia},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {423},
doi = {10.1007/978-3-642-36362-7_22},
year = {2013}
}
@inproceedings{PKC-2013-24512,
title = {Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited},
author = {Zhengan Huang and Shengli Liu and Baodong Qin},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {440},
doi = {10.1007/978-3-642-36362-7_23},
year = {2013}
}
@inproceedings{PKC-2013-24513,
title = {Rate-Limited Secure Function Evaluation: Definitions and Constructions},
author = {\"Ozg\"ur Dagdelen and Payman Mohassel and Daniele Venturi},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {457},
doi = {10.1007/978-3-642-36362-7_28},
year = {2013}
}
@inproceedings{PKC-2013-24514,
title = {Verifiable Elections That Scale for Free},
author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {475},
doi = {10.1007/978-3-642-36362-7_29},
year = {2013}
}
@inproceedings{PKC-2013-24515,
title = {On the Connection between Leakage Tolerance and Adaptive Security},
author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel},
booktitle = {Public-Key Cryptography - PKC 2013},
volume = {7778},
pages = {493},
doi = {10.1007/978-3-642-36362-7_30},
year = {2013}
}
@proceedings{pkc-2013-24779,
title = {Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings},
booktitle = {PKC},
volume = {7778},
doi = {10.1007/978-3-642-36362-7},
publisher = {Springer},
year = {2013}
}
@inproceedings{TCC-2013-24516,
title = {Overcoming Weak Expectations},
author = {Yevgeniy Dodis and Yu Yu},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {1},
doi = {10.1007/978-3-642-36594-2_1},
year = {2013}
}
@inproceedings{TCC-2013-24517,
title = {A Counterexample to the Chain Rule for Conditional HILL Entropy, and what Deniable Encryption has to do with it},
author = {Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {23},
doi = {10.1007/978-3-642-36594-2_2},
year = {2013}
}
@inproceedings{TCC-2013-24518,
title = {Hardness Preserving Reductions via Cuckoo Hashing},
author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {40},
doi = {10.1007/978-3-642-36594-2_3},
year = {2013}
}
@inproceedings{TCC-2013-24519,
title = {Concurrent Zero Knowledge in the Bounded Player Model},
author = {Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {60},
doi = {10.1007/978-3-642-36594-2_4},
year = {2013}
}
@inproceedings{TCC-2013-24520,
title = {Public-Coin Concurrent Zero-Knowledge in the Global Hash Model},
author = {Ran Canetti and Huijia Lin and Omer Paneth},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {80},
doi = {10.1007/978-3-642-36594-2_5},
year = {2013}
}
@inproceedings{TCC-2013-24521,
title = {Succinct Malleable NIZKs and an Application to Compact Shuffles},
author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {100},
doi = {10.1007/978-3-642-36594-2_6},
year = {2013}
}
@inproceedings{TCC-2013-24522,
title = {Encrypted Messages from the Heights of Cryptomania},
author = {Craig Gentry},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {120},
doi = {10.1007/978-3-642-36594-2_7},
year = {2013}
}
@inproceedings{TCC-2013-24523,
title = {Attribute-Based Functional Encryption on Lattices},
author = {Xavier Boyen},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {122},
doi = {10.1007/978-3-642-36594-2_8},
year = {2013}
}
@inproceedings{TCC-2013-24524,
title = {When Homomorphism Becomes a Liability},
author = {Zvika Brakerski},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {142},
doi = {10.1007/978-3-642-36594-2_9},
year = {2013}
}
@inproceedings{TCC-2013-24525,
title = {Garbling XOR Gates 'For Free' in the Standard Model},
author = {Benny Applebaum},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {161},
doi = {10.1007/978-3-642-36594-2_10},
year = {2013}
}
@inproceedings{TCC-2013-24526,
title = {Why ``Fiat-Shamir for Proofs' Lacks a Proof},
author = {Nir Bitansky and Dana Dachman-Soled and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai and Adriana Lopez-Alt and Daniel Wichs},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {181},
doi = {10.1007/978-3-642-36594-2_11},
year = {2013}
}
@inproceedings{TCC-2013-24527,
title = {On the (In)security of Fischlin's Paradigm},
author = {Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {201},
doi = {10.1007/978-3-642-36594-2_12},
year = {2013}
}
@proceedings{tcc-2013-24783,
title = {Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
booktitle = {TCC},
volume = {7785},
doi = {10.1007/978-3-642-36594-2},
publisher = {Springer},
year = {2013}
}
@inproceedings{TCC-2013-24528,
title = {Signatures of Correct Computation},
author = {Charalampos Papamanthou and Elaine Shi and Roberto Tamassia},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {221},
doi = {10.1007/978-3-642-36594-2_13},
year = {2013}
}
@inproceedings{TCC-2013-24529,
title = {A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness},
author = {Gilad Asharov and Yehuda Lindell and Tal Rabin},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {241},
doi = {10.1007/978-3-642-36594-2_14},
year = {2013}
}
@inproceedings{TCC-2013-24530,
title = {Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities},
author = {R. Amzi Jeffs and Mike Rosulek},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {261},
doi = {10.1007/978-3-642-36594-2_15},
year = {2013}
}
@inproceedings{TCC-2013-24531,
title = {Feasibility and Completeness of Cryptographic Tasks in the Quantum World},
author = {Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {279},
doi = {10.1007/978-3-642-36594-2_16},
year = {2013}
}
@inproceedings{TCC-2013-24532,
title = {Languages with Efficient Zero-Knowledge PCPs are in SZK},
author = {Mohammad Mahmoody and David Xiao},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {295},
doi = {10.1007/978-3-642-36594-2_17},
year = {2013}
}
@inproceedings{TCC-2013-24533,
title = {Succinct Non-Interactive Arguments via Linear Interactive Proofs},
author = {Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {315},
doi = {10.1007/978-3-642-36594-2_18},
year = {2013}
}
@inproceedings{TCC-2013-24534,
title = {Barriers to Provably-Secure Perfect NIZK and Non-interactive Non-malleable Commitments},
author = {Rafael Pass},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {334},
doi = {10.1007/978-3-642-36594-2_19},
year = {2013}
}
@inproceedings{TCC-2013-24535,
title = {Secure Computation for Big Data},
author = {Tal Malkin},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {354},
doi = {10.1007/978-3-642-36594-2_20},
year = {2013}
}
@inproceedings{TCC-2013-24536,
title = {Communication Locality in Secure Multi-Party Computation: How to Run Sublinear Algorithms in a Distributed Setting},
author = {Elette Boyle and Shafi Goldwasser and Stefano Tessaro},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {355},
doi = {10.1007/978-3-642-36594-2_21},
year = {2013}
}
@inproceedings{TCC-2013-24537,
title = {Distributed Oblivious RAM for Secure Two-Party Computation},
author = {Steve Lu and Rafail Ostrovsky},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {375},
doi = {10.1007/978-3-642-36594-2_22},
year = {2013}
}
@inproceedings{TCC-2013-24538,
title = {Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead},
author = {Steven Myers and Mona Sergi and abhi shelat},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {395},
doi = {10.1007/978-3-642-36594-2_23},
year = {2013}
}
@inproceedings{TCC-2013-24539,
title = {Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy},
author = {Kashyap Dixit and Madhav Jha and Sofya Raskhodnikova and Abhradeep Thakurta},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {415},
doi = {10.1007/978-3-642-36594-2_24},
year = {2013}
}
@inproceedings{TCC-2013-24540,
title = {Limits on the Usefulness of Random Oracles},
author = {Iftach Haitner and Eran Omri and Hila Zarosim},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {435},
doi = {10.1007/978-3-642-36594-2_25},
year = {2013}
}
@inproceedings{TCC-2013-24541,
title = {Analyzing Graphs with Node Differential Privacy},
author = {Shiva Kasiviswanathan and Kobbi Nissim and Sofya Raskhodnikova and Adam Smith},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {455},
doi = {10.1007/978-3-642-36594-2_26},
year = {2013}
}
@inproceedings{TCC-2013-24542,
title = {Universally Composable Synchronous Computation},
author = {Jonathan Katz and Ueli M. Maurer and Bjorn Tackmann and Vassilis Zikas},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {475},
doi = {10.1007/978-3-642-36594-2_27},
year = {2013}
}
@inproceedings{TCC-2013-24543,
title = {Multi-Client Non-Interactive Verifiable Computation},
author = {Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {497},
doi = {10.1007/978-3-642-36594-2_28},
year = {2013}
}
@inproceedings{TCC-2013-24544,
title = {On the Feasibility of Extending Oblivious Transfer},
author = {Yehuda Lindell and Hila Zarosim},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {517},
doi = {10.1007/978-3-642-36594-2_29},
year = {2013}
}
@inproceedings{TCC-2013-24545,
title = {Computational Soundness of Coinductive Symbolic Security under Active Attacks},
author = {Mohammad Hajiabadi and Bruce M. Kapron},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {537},
doi = {10.1007/978-3-642-36594-2_30},
year = {2013}
}
@inproceedings{TCC-2013-24546,
title = {Revisiting Lower and Upper Bounds for Selective Decommitments},
author = {Rafail Ostrovsky and Vanishree Rao and Alessandra Scafuro and Ivan Visconti},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {557},
doi = {10.1007/978-3-642-36594-2_31},
year = {2013}
}
@inproceedings{TCC-2013-24547,
title = {On the Circular Security of Bit-Encryption},
author = {Ron D. Rothblum},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {577},
doi = {10.1007/978-3-642-36594-2_32},
year = {2013}
}
@inproceedings{TCC-2013-24548,
title = {Cryptographic Hardness of Random Local Functions -- Survey},
author = {Benny Applebaum},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {597},
doi = {10.1007/978-3-642-36594-2_33},
year = {2013}
}
@inproceedings{TCC-2013-24549,
title = {On the Power of Correlated Randomness in Secure Computation},
author = {Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Claudio Orlandi and Anat Paskin-Cherniavsky},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {598},
doi = {10.1007/978-3-642-36594-2_34},
year = {2013}
}
@inproceedings{TCC-2013-24550,
title = {Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing},
author = {Ivan Damg\r ard and Sarah Zakarias},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {618},
doi = {10.1007/978-3-642-36594-2_35},
year = {2013}
}
@inproceedings{TCC-2013-24551,
title = {Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens},
author = {Nico D\"ottling and Thilo Mie and J\"orn M\"uller-Quade and Tobias Nilges},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {639},
doi = {10.1007/978-3-642-36594-2_36},
year = {2013}
}
@inproceedings{TCC-2013-24552,
title = {A Cookbook for Black-Box Separations and a Recipe for UOWHFs},
author = {Kfir Barhum and Thomas Holenstein},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {659},
doi = {10.1007/978-3-642-36594-2_37},
year = {2013}
}
@inproceedings{TCC-2013-24553,
title = {Algebraic (Trapdoor) One Way Functions and their Applications},
author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Konstantinos Vamvourellis},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {679},
doi = {10.1007/978-3-642-36594-2_38},
year = {2013}
}
@inproceedings{TCC-2013-24554,
title = {Randomness-Dependent Message Security},
author = {Eleanor Birrell and Kai-Min Chung and Rafael Pass and Sidharth Telang},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {699},
doi = {10.1007/978-3-642-36594-2_39},
year = {2013}
}
@inproceedings{TCC-2013-24555,
title = {ERRATA: (Nearly) round-optimal black-box constructions of commitments secure against selective opening attacks},
author = {David Xiao},
booktitle = {10th Theory of Cryptography Conference},
volume = {7785},
pages = {719},
doi = {10.1007/978-3-642-36594-2_40},
year = {2013}
}
@proceedings{asiacrypt-2012-24412,
title = {Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings},
booktitle = {ASIACRYPT},
volume = {7658},
url = {http://link.springer.com/book/10.1007/978-3-642-34961-4},
doi = {10.1007/978-3-642-34961-4},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24413,
title = {Optimal Collision Security in Double Block Length Hashing with Single Length Key},
author = {Bart Mennink},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {526--543},
doi = {10.1007/978-3-642-34961-4_32},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24414,
title = {A Coding-Theoretic Approach to Recovering Noisy RSA Keys},
author = {Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {386--403},
doi = {10.1007/978-3-642-34961-4_24},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24415,
title = {Theory and Practice of a Leakage Resilient Masking Scheme},
author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Ingrid Verbauwhede},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {758--775},
doi = {10.1007/978-3-642-34961-4_45},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24416,
title = {Completeness for Symmetric Two-Party Functionalities - Revisited},
author = {Yehuda Lindell and Eran Omri and Hila Zarosim},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {116--133},
doi = {10.1007/978-3-642-34961-4_9},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24417,
title = {3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound},
author = {Liting Zhang and Wenling Wu and Han Sui and Peng Wang},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {296--312},
doi = {10.1007/978-3-642-34961-4_19},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24418,
title = {Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing},
author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {134--153},
doi = {10.1007/978-3-642-34961-4_10},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24419,
title = {Perfect Algebraic Immune Functions},
author = {Meicheng Liu and Yin Zhang and Dongdai Lin},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {172--189},
doi = {10.1007/978-3-642-34961-4_12},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24420,
title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions},
author = {Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {4--24},
doi = {10.1007/978-3-642-34961-4_3},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24421,
title = {Analysis of Differential Attacks in ARX Constructions},
author = {Ga\"etan Leurent},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {226--243},
doi = {10.1007/978-3-642-34961-4_15},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24422,
title = {The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions},
author = {Scott Ames and Rosario Gennaro and Muthuramakrishnan Venkitasubramaniam},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {154--171},
doi = {10.1007/978-3-642-34961-4_11},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24423,
title = {Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks},
author = {Yu Sasaki and Lei Wang and Shuang Wu and Wenling Wu},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {562--579},
doi = {10.1007/978-3-642-34961-4_34},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24424,
title = {Dual Form Signatures: An Approach for Proving Security from Static Assumptions},
author = {Michael Gerbush and Allison B. Lewko and Adam O'Neill and Brent Waters},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {25--42},
doi = {10.1007/978-3-642-34961-4_4},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24425,
title = {On the (Im)possibility of Projecting Property in Prime-Order Setting},
author = {Jae Hong Seo},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {61--79},
doi = {10.1007/978-3-642-34961-4_6},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24426,
title = {Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract)},
author = {Kyle Brogle and Sharon Goldberg and Leonid Reyzin},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {644--662},
doi = {10.1007/978-3-642-34961-4_39},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24427,
title = {RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures},
author = {Mihir Bellare and Kenneth G. Paterson and Susan Thomson},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {331--348},
doi = {10.1007/978-3-642-34961-4_21},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24428,
title = {Differential Attacks against Stream Cipher ZUC},
author = {Hongjun Wu and Tao Huang and Phuong Ha Nguyen and Huaxiong Wang and San Ling},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {262--277},
doi = {10.1007/978-3-642-34961-4_17},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24429,
title = {ECM at Work},
author = {Joppe W. Bos and Thorsten Kleinjung},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {467--484},
doi = {10.1007/978-3-642-34961-4_29},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24430,
title = {Certifying RSA},
author = {Saqib A. Kakvi and Eike Kiltz and Alexander May},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {404--414},
doi = {10.1007/978-3-642-34961-4_25},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24431,
title = {A Mix-Net from Any CCA2 Secure Cryptosystem},
author = {Shahram Khazaei and Tal Moran and Douglas Wikström},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {607--625},
doi = {10.1007/978-3-642-34961-4_37},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24432,
title = {Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise},
author = {Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {663--680},
doi = {10.1007/978-3-642-34961-4_40},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24433,
title = {Signature Schemes Secure against Hard-to-Invert Leakage},
author = {Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {98--115},
doi = {10.1007/978-3-642-34961-4_8},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24434,
title = {How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios},
author = {David Bernhard and Olivier Pereira and Bogdan Warinschi},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {626--643},
doi = {10.1007/978-3-642-34961-4_38},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24435,
title = {On Polynomial Systems Arising from a Weil Descent},
author = {Christophe Petit and Jean-Jacques Quisquater},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {451--466},
doi = {10.1007/978-3-642-34961-4_28},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24436,
title = {Integral and Multidimensional Linear Distinguishers with Correlation Zero},
author = {Andrey Bogdanov and Gregor Leander and Kaisa Nyberg and Meiqin Wang},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {244--261},
doi = {10.1007/978-3-642-34961-4_16},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24437,
title = {Differential Analysis of the LED Block Cipher},
author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {190--207},
doi = {10.1007/978-3-642-34961-4_13},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24438,
title = {The Five-Card Trick Can Be Done with Four Cards},
author = {Takaaki Mizuki and Michihito Kumamoto and Hideaki Sone},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {598--606},
doi = {10.1007/978-3-642-34961-4_36},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24439,
title = {Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings},
author = {Dmitry Khovratovich},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {544--561},
doi = {10.1007/978-3-642-34961-4_33},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24440,
title = {A Unified Framework for UC from Only OT},
author = {Rafael Pass and Huijia Lin and Muthuramakrishnan Venkitasubramaniam},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {699--717},
doi = {10.1007/978-3-642-34961-4_42},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24441,
title = {PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract},
author = {Julia Borghoff and Anne Canteaut and Tim Güneysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and Søren S. Thomsen and Tolga Yalçin},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {208--225},
doi = {10.1007/978-3-642-34961-4_14},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24442,
title = {Fully Secure Unbounded Inner-Product and Attribute-Based Encryption},
author = {Tatsuaki Okamoto and Katsuyuki Takashima},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {349--366},
doi = {10.1007/978-3-642-34961-4_22},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24443,
title = {Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note},
author = {Nicolas Veyrat-Charvillon and Marcel Medwed and Stéphanie Kerckhof and Fran\c cois-Xavier Standaert},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {740--757},
doi = {10.1007/978-3-642-34961-4_44},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24444,
title = {Understanding Adaptivity: Random Systems Revisited},
author = {Dimitar Jetchev and Onur Özen and Martijn Stam},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {313--330},
doi = {10.1007/978-3-642-34961-4_20},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24445,
title = {Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication},
author = {Patrick Longa and Francesco Sica},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {718--739},
doi = {10.1007/978-3-642-34961-4_43},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24446,
title = {Breaking Pairing-Based Cryptosystems Using \&\#951; T Pairing over GF(397)},
author = {Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {43--60},
doi = {10.1007/978-3-642-34961-4_5},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24447,
title = {Some Mathematical Mysteries in Lattices},
author = {Chuanming Zong},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {2--3},
doi = {10.1007/978-3-642-34961-4_2},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24448,
title = {Pairing-Based Cryptography: Past, Present, and Future},
author = {Dan Boneh},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {1},
doi = {10.1007/978-3-642-34961-4_1},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24449,
title = {Optimal Reductions of Some Decisional Problems to the Rank Problem},
author = {Jorge Luis Villar},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {80--97},
doi = {10.1007/978-3-642-34961-4_7},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24450,
title = {Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic},
author = {Léo Ducas and Phong Q. Nguyen},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {415--432},
doi = {10.1007/978-3-642-34961-4_26},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24451,
title = {Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures},
author = {Léo Ducas and Phong Q. Nguyen},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {433--450},
doi = {10.1007/978-3-642-34961-4_27},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24452,
title = {Generic Related-Key Attacks for HMAC},
author = {Thomas Peyrin and Yu Sasaki and Lei Wang},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {580--597},
doi = {10.1007/978-3-642-34961-4_35},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24453,
title = {Calling Out Cheaters: Covert Security with Public Verifiability},
author = {Gilad Asharov and Claudio Orlandi},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {681--698},
doi = {10.1007/978-3-642-34961-4_41},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24454,
title = {Computing on Authenticated Data: New Privacy Definitions and Constructions},
author = {Nuttapong Attrapadung and Beno\^\it Libert and Thomas Peters},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {367--385},
doi = {10.1007/978-3-642-34961-4_23},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24455,
title = {IND-CCA Secure Cryptography Based on a Variant of the LPN Problem},
author = {Nico D\"ottling and J\"orn M\"uller-Quade and Anderson C. A. Nascimento},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {485--503},
doi = {10.1007/978-3-642-34961-4_30},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24456,
title = {Provable Security of the Knudsen-Preneel Compression Functions},
author = {Jooyoung Lee},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {504--525},
doi = {10.1007/978-3-642-34961-4_31},
publisher = {Springer},
year = {2012}
}
@inproceedings{asiacrypt-2012-24457,
title = {An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher},
author = {Rodolphe Lampe and Jacques Patarin and Yannick Seurin},
booktitle = {ASIACRYPT},
volume = {7658},
pages = {278--295},
doi = {10.1007/978-3-642-34961-4_18},
publisher = {Springer},
year = {2012}
}
@proceedings{ches-2012-24379,
title = {Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
booktitle = {CHES},
volume = {7428},
doi = {10.1007/978-3-642-33027-8},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24380,
title = {Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware},
author = {Stefan Heyse and Tim Güneysu},
booktitle = {CHES},
volume = {7428},
pages = {340--355},
doi = {10.1007/978-3-642-33027-8_20},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24381,
title = {Practical Security Analysis of PUF-Based Two-Player Protocols},
author = {Ulrich R\"uhrmair and Marten van Dijk},
booktitle = {CHES},
volume = {7428},
pages = {251--267},
doi = {10.1007/978-3-642-33027-8_15},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24382,
title = {A Statistical Model for DPA with Novel Algorithmic Confusion Analysis},
author = {Yunsi Fei and Qiasi Luo and A. Adam Ding},
booktitle = {CHES},
volume = {7428},
pages = {233--250},
doi = {10.1007/978-3-642-33027-8_14},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24383,
title = {Selecting Time Samples for Multivariate DPA Attacks},
author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede},
booktitle = {CHES},
volume = {7428},
pages = {155--174},
doi = {10.1007/978-3-642-33027-8_10},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24384,
title = {Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us},
author = {Alexander Schlösser and Dmitry Nedospasov and Juliane Krämer and Susanna Orlic and Jean-Pierre Seifert},
booktitle = {CHES},
volume = {7428},
pages = {41--57},
doi = {10.1007/978-3-642-33027-8_3},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24385,
title = {Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint},
author = {Stéphanie Kerckhof and François Durvaux and Cédric Hocquet and David Bol and Fran\c cois-Xavier Standaert},
booktitle = {CHES},
volume = {7428},
pages = {390--407},
doi = {10.1007/978-3-642-33027-8_23},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24386,
title = {An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor},
author = {Jen-Wei Lee and Szu-Chi Chung and Hsie-Chia Chang and Chen-Yi Lee},
booktitle = {CHES},
volume = {7428},
pages = {548--564},
doi = {10.1007/978-3-642-33027-8_32},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24387,
title = {On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes},
author = {Norman Göttert and Thomas Feller and Michael Schneider 0002 and Johannes Buchmann and Sorin A. Huss},
booktitle = {CHES},
volume = {7428},
pages = {512--529},
doi = {10.1007/978-3-642-33027-8_30},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24388,
title = {Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking},
author = {Blandine Debraize},
booktitle = {CHES},
volume = {7428},
pages = {107--121},
doi = {10.1007/978-3-642-33027-8_7},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24389,
title = {Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs},
author = {Chester Rebeiro and Sujoy Sinha Roy and Debdeep Mukhopadhyay},
booktitle = {CHES},
volume = {7428},
pages = {494--511},
doi = {10.1007/978-3-642-33027-8_29},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24390,
title = {Solving Quadratic Equations with XL on Parallel Architectures},
author = {Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Bo-Yin Yang},
booktitle = {CHES},
volume = {7428},
pages = {356--373},
doi = {10.1007/978-3-642-33027-8_21},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24391,
title = {Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents},
author = {Santanu Sarkar and Subhamoy Maitra},
booktitle = {CHES},
volume = {7428},
pages = {476--493},
doi = {10.1007/978-3-642-33027-8_28},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24392,
title = {NEON Crypto},
author = {Daniel J. Bernstein and Peter Schwabe},
booktitle = {CHES},
volume = {7428},
pages = {320--339},
doi = {10.1007/978-3-642-33027-8_19},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24393,
title = {Efficient Implementations of MQPKS on Constrained Devices},
author = {Peter Czypek and Stefan Heyse and Enrico Thomae},
booktitle = {CHES},
volume = {7428},
pages = {374--389},
doi = {10.1007/978-3-642-33027-8_22},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24394,
title = {Practical Leakage-Resilient Symmetric Cryptography},
author = {Sebastian Faust and Krzysztof Pietrzak and Joachim Schipper},
booktitle = {CHES},
volume = {7428},
pages = {213--232},
doi = {10.1007/978-3-642-33027-8_13},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24395,
title = {Threshold Implementations of All 3 \×3 and 4 \×4 S-Boxes},
author = {Begül Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Georg Stütz},
booktitle = {CHES},
volume = {7428},
pages = {76--91},
doi = {10.1007/978-3-642-33027-8_5},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24396,
title = {Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems},
author = {Tim Güneysu and Vadim Lyubashevsky and Thomas Pöppelmann},
booktitle = {CHES},
volume = {7428},
pages = {530--547},
doi = {10.1007/978-3-642-33027-8_31},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24397,
title = {Low-Latency Encryption - Is 'Lightweight = Light + Wait'?},
author = {Miroslav Knezevic and Ventzislav Nikov and Peter Rombouts},
booktitle = {CHES},
volume = {7428},
pages = {426--446},
doi = {10.1007/978-3-642-33027-8_25},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24398,
title = {Breakthrough Silicon Scanning Discovers Backdoor in Military Chip},
author = {Sergei Skorobogatov and Christopher Woods},
booktitle = {CHES},
volume = {7428},
pages = {23--40},
doi = {10.1007/978-3-642-33027-8_2},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24399,
title = {Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication},
author = {Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz},
booktitle = {CHES},
volume = {7428},
pages = {447--462},
doi = {10.1007/978-3-642-33027-8_26},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24400,
title = {3D Hardware Canaries},
author = {Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf},
booktitle = {CHES},
volume = {7428},
pages = {1--22},
doi = {10.1007/978-3-642-33027-8_1},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24401,
title = {How Far Should Theory Be from Practice? - Evaluation of a Countermeasure},
author = {Amir Moradi and Oliver Mischke},
booktitle = {CHES},
volume = {7428},
pages = {92--106},
doi = {10.1007/978-3-642-33027-8_6},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24402,
title = {Compiler Assisted Masking},
author = {Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall},
booktitle = {CHES},
volume = {7428},
pages = {58--75},
doi = {10.1007/978-3-642-33027-8_4},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24403,
title = {Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment},
author = {Vincent van der Leest and Bart Preneel and Erik van der Sluis},
booktitle = {CHES},
volume = {7428},
pages = {268--282},
doi = {10.1007/978-3-642-33027-8_16},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24404,
title = {Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA},
author = {Michael Vielhaber},
booktitle = {CHES},
volume = {7428},
pages = {463--475},
doi = {10.1007/978-3-642-33027-8_27},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24405,
title = {Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting},
author = {Beno\^\it G\'erard and Fran\c cois-Xavier Standaert},
booktitle = {CHES},
volume = {7428},
pages = {175--192},
doi = {10.1007/978-3-642-33027-8_11},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24406,
title = {PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator},
author = {Roel Maes and Anthony Van Herrewege and Ingrid Verbauwhede},
booktitle = {CHES},
volume = {7428},
pages = {302--319},
doi = {10.1007/978-3-642-33027-8_18},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24407,
title = {A Differential Fault Attack on the Grain Family of Stream Ciphers},
author = {Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar},
booktitle = {CHES},
volume = {7428},
pages = {122--139},
doi = {10.1007/978-3-642-33027-8_8},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24408,
title = {Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs},
author = {Marcel Medwed and Fran\c cois-Xavier Standaert and Antoine Joux},
booktitle = {CHES},
volume = {7428},
pages = {193--212},
doi = {10.1007/978-3-642-33027-8_12},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24409,
title = {PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon},
author = {Stefan Katzenbeisser and Ünal Koçabas and Vladimir Rozic and Ahmad-Reza Sadeghi and Ingrid Verbauwhede and Christian Wachsmann},
booktitle = {CHES},
volume = {7428},
pages = {283--301},
doi = {10.1007/978-3-642-33027-8_17},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24410,
title = {Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation},
author = {Seiichi Matsuda and Shiho Moriai},
booktitle = {CHES},
volume = {7428},
pages = {408--425},
doi = {10.1007/978-3-642-33027-8_24},
publisher = {Springer},
year = {2012}
}
@inproceedings{ches-2012-24411,
title = {Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model},
author = {Yossef Oren and Mathieu Renauld and Fran\c cois-Xavier Standaert and Avishai Wool},
booktitle = {CHES},
volume = {7428},
pages = {140--154},
doi = {10.1007/978-3-642-33027-8_9},
publisher = {Springer},
year = {2012}
}
@inproceedings{crypto-2012-24320,
title = {Homomorphic Evaluation of the AES Circuit},
author = {Craig Gentry and Shai Halevi and Nigel P. Smart},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {850--867},
doi = {10.1007/978-3-642-32009-5_49},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24321,
title = {Differential Privacy with Imperfect Randomness},
author = {Yevgeniy Dodis and Adriana L\'opez-Alt and Ilya Mironov and Salil P. Vadhan},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {497--516},
doi = {10.1007/978-3-642-32009-5_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24322,
title = {Securing Circuits against Constant-Rate Tampering},
author = {Dana Dachman-Soled and Yael Tauman Kalai},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {533--551},
doi = {10.1007/978-3-642-32009-5_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24323,
title = {New Preimage Attacks against Reduced SHA-1},
author = {Simon Knellwolf and Dmitry Khovratovich},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {367--383},
doi = {10.1007/978-3-642-32009-5_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24324,
title = {Must You Know the Code of f to Securely Compute f?},
author = {Mike Rosulek},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {87--104},
doi = {10.1007/978-3-642-32009-5_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24325,
title = {On the Distribution of Linear Biases: Three Instructive Examples},
author = {Mohamed Ahmed Abdelraheem and Martin \r Agren and Peter Beelen and Gregor Leander},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {50--67},
doi = {10.1007/978-3-642-32009-5_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24326,
title = {Tweakable Blockciphers with Beyond Birthday-Bound Security},
author = {Will Landecker and Thomas Shrimpton and R. Seth Terashima},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {14--30},
doi = {10.1007/978-3-642-32009-5_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24327,
title = {Secret Sharing Schemes for Very Dense Graphs},
author = {Amos Beimel and Oriol Farr\`as and Yuval Mintz},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {144--161},
doi = {10.1007/978-3-642-32009-5_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24328,
title = {Black-Box Constructions of Composable Protocols without Set-Up},
author = {Huijia Lin and Rafael Pass},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {461--478},
doi = {10.1007/978-3-642-32009-5_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24329,
title = {The End of Crypto},
author = {Jonathan Zittrain},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {86},
doi = {10.1007/978-3-642-32009-5_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24330,
title = {Group Signatures with Almost-for-Free Revocation},
author = {Beno\^\it Libert and Thomas Peters and Moti Yung},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {571--589},
doi = {10.1007/978-3-642-32009-5_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24331,
title = {Crowd-Blending Privacy},
author = {Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {479--496},
doi = {10.1007/978-3-642-32009-5_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24332,
title = "How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware",
author = {Guy N. Rothblum},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {552--569},
doi = {10.1007/978-3-642-32009-5_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24333,
title = {Tamper and Leakage Resilience in the Split-State Model},
author = {Feng-Hao Liu and Anna Lysyanskaya},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {517--532},
doi = {10.1007/978-3-642-32009-5_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24334,
title = {Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority},
author = {Eli Ben-Sasson and Serge Fehr and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {663--680},
doi = {10.1007/978-3-642-32009-5_39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24335,
title = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems},
author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {719--740},
doi = {10.1007/978-3-642-32009-5_42},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24336,
title = {New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation},
author = {Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {443--460},
doi = {10.1007/978-3-642-32009-5_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@proceedings{crypto-2012-24286,
title = {Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
url = {http://link.springer.com/book/10.1007/978-3-642-32009-5},
doi = {10.1007/978-3-642-32009-5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24287,
title = {Public Keys},
author = {Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {626--642},
doi = {10.1007/978-3-642-32009-5_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24288,
title = {Hash Functions Based on Three Permutations: A Generic Security Analysis},
author = {Bart Mennink and Bart Preneel},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {330--347},
doi = {10.1007/978-3-642-32009-5_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24289,
title = {Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs},
author = {Eric Miles and Emanuele Viola},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {68--85},
doi = {10.1007/978-3-642-32009-5_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24290,
title = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption},
author = {Amit Sahai and Hakan Seyalioglu and Brent Waters},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {199--217},
doi = {10.1007/978-3-642-32009-5_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24291,
title = {A New Approach to Practical Active-Secure Two-Party Computation},
author = {Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Sai Sheshank Burra},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {681--700},
doi = {10.1007/978-3-642-32009-5_40},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24292,
title = {Semantic Security for the Wiretap Channel},
author = {Mihir Bellare and Stefano Tessaro and Alexander Vardy},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {294--311},
doi = {10.1007/978-3-642-32009-5_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24293,
title = {On the Security of TLS-DHE in the Standard Model},
author = {Tibor Jager and Florian Kohlar and Sven Sch\"age and J\"org Schwenk},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {273--293},
doi = {10.1007/978-3-642-32009-5_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24294,
title = {Universal Composability from Essentially Any Trusted Setup},
author = {Mike Rosulek},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {406--423},
doi = {10.1007/978-3-642-32009-5_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24295,
title = {Quantum to Classical Randomness Extractors},
author = {Mario Berta and Omar Fawzi and Stephanie Wehner},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {776--793},
doi = {10.1007/978-3-642-32009-5_45},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24296,
title = {Breaking and Repairing GCM Security Proofs},
author = {Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {31--49},
doi = {10.1007/978-3-642-32009-5_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24297,
title = {To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC},
author = {Yevgeniy Dodis and Thomas Ristenpart and John P. Steinberger and Stefano Tessaro},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {348--366},
doi = {10.1007/978-3-642-32009-5_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24298,
title = {Secure Identity-Based Encryption in the Quantum Random Oracle Model},
author = {Mark Zhandry},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {758--775},
doi = {10.1007/978-3-642-32009-5_44},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24299,
title = {Functional Encryption for Regular Languages},
author = {Brent Waters},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {218--235},
doi = {10.1007/978-3-642-32009-5_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24300,
title = {An Enciphering Scheme Based on a Card Shuffle},
author = {Viet Tung Hoang and Ben Morris and Phillip Rogaway},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {1--13},
doi = {10.1007/978-3-642-32009-5_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24301,
title = {Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits},
author = {Nir Bitansky and Alessandro Chiesa},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {255--272},
doi = {10.1007/978-3-642-32009-5_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24302,
title = {Actively Secure Two-Party Evaluation of Any Quantum Operation},
author = {Fr\'ed\'eric Dupuis and Jesper Buus Nielsen and Louis Salvail},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {794--811},
doi = {10.1007/978-3-642-32009-5_46},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24303,
title = {Functional Encryption with Bounded Collusions via Multi-party Computation},
author = {Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {162--179},
doi = {10.1007/978-3-642-32009-5_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24304,
title = {Secure Database Commitments and Universal Arguments of Quasi Knowledge},
author = {Melissa Chase and Ivan Visconti},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {236--254},
doi = {10.1007/978-3-642-32009-5_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24305,
title = {Resistance against Iterated Attacks by Decorrelation Revisited, },
author = {Asli Bay and Atefeh Mashatan and Serge Vaudenay},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {741--757},
doi = {10.1007/978-3-642-32009-5_43},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24306,
title = {Adaptively Secure Multi-Party Computation with Dishonest Majority},
author = {Sanjam Garg and Amit Sahai},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {105--123},
doi = {10.1007/978-3-642-32009-5_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24307,
title = {On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups},
author = {Goichiro Hanaoka and Takahiro Matsuda and Jacob C. N. Schuldt},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {812--831},
doi = {10.1007/978-3-642-32009-5_47},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24308,
title = {Impossibility Results for Static Input Secure Computation},
author = {Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {424--442},
doi = {10.1007/978-3-642-32009-5_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24309,
title = {Collusion-Preserving Computation},
author = {Jo\"el Alwen and Jonathan Katz and Ueli M. Maurer and Vassilis Zikas},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {124--143},
doi = {10.1007/978-3-642-32009-5_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24310,
title = {Multiparty Computation from Somewhat Homomorphic Encryption},
author = {Ivan Damg\r ard and Valerio Pastro and Nigel P. Smart and Sarah Zakarias},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {643--662},
doi = {10.1007/978-3-642-32009-5_38},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24311,
title = {Efficient Padding Oracle Attacks on Cryptographic Hardware},
author = {Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {608--625},
doi = {10.1007/978-3-642-32009-5_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24312,
title = {Tightly Secure Signatures and Public-Key Encryption},
author = {Dennis Hofheinz and Tibor Jager},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {590--607},
doi = {10.1007/978-3-642-32009-5_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24313,
title = {The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives},
author = {Mohammad Mahmoody and Rafael Pass},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {701--718},
doi = {10.1007/978-3-642-32009-5_41},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24314,
title = {Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves},
author = {Alexandre Duc and Dimitar Jetchev},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {832--849},
doi = {10.1007/978-3-642-32009-5_48},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24315,
title = {Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP},
author = {Zvika Brakerski},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {868--886},
doi = {10.1007/978-3-642-32009-5_50},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24316,
title = {Multi-instance Security and Its Application to Password-Based Cryptography},
author = {Mihir Bellare and Thomas Ristenpart and Stefano Tessaro},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {312--329},
doi = {10.1007/978-3-642-32009-5_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24317,
title = {Stam's Conjecture and Threshold Phenomena in Collision Resistance},
author = {John P. Steinberger and Xiaoming Sun and Zhe Yang},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {384--405},
doi = {10.1007/978-3-642-32009-5_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24318,
title = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques},
author = {Allison B. Lewko and Brent Waters},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {180--198},
doi = {10.1007/978-3-642-32009-5_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{crypto-2012-24319,
title = {Recent Advances and Existing Research Questions in Platform Security},
author = {Ernie Brickell},
booktitle = {Advances in Cryptology - Crypto 2012},
volume = {7417},
pages = {570},
doi = {10.1007/978-3-642-32009-5_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24240,
title = {Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over $F_(p^6)$},
author = {Antoine Joux and Vanessa Vitse},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {9--26},
doi = {10.1007/978-3-642-29011-4_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24241,
title = {Malleable Proof Systems and Applications},
author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {281--300},
doi = {10.1007/978-3-642-29011-4_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24242,
title = {Robust Coin Flipping},
author = {Gene S. Kopp and John D. Wiltshire-Gordon},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {172--194},
doi = {10.1007/978-3-642-29011-4_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24243,
title = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation},
author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {682--699},
doi = {10.1007/978-3-642-29011-4_40},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24244,
title = {Identity-Based (Lossy) Trapdoor Functions and Applications},
author = {Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {228--245},
doi = {10.1007/978-3-642-29011-4_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24245,
title = {Message Authentication, Revisited},
author = {Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {355--374},
doi = {10.1007/978-3-642-29011-4_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24246,
title = {All-But-Many Lossy Trapdoor Functions},
author = {Dennis Hofheinz},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {209--227},
doi = {10.1007/978-3-642-29011-4_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24247,
title = {Identity-Based Encryption Resilient to Continual Auxiliary Leakage},
author = {Tsz Hon Yuen and Sherman S. M. Chow and Ye Zhang and Siu Ming Yiu},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {117--134},
doi = {10.1007/978-3-642-29011-4_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24248,
title = {Concurrently Secure Computation in Constant Rounds},
author = {Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {99--116},
doi = {10.1007/978-3-642-29011-4_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24249,
title = {Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More},
author = {Hoeteck Wee},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {246--262},
doi = {10.1007/978-3-642-29011-4_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24250,
title = {Quantum Proofs of Knowledge},
author = {Dominique Unruh},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {135--152},
doi = {10.1007/978-3-642-29011-4_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24251,
title = {Standard Security Does Not Imply Security against Selective-Opening},
author = {Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {645--662},
doi = {10.1007/978-3-642-29011-4_38},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24252,
title = {Pseudorandom Functions and Lattices},
author = {Abhishek Banerjee and Chris Peikert and Alon Rosen},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {719--737},
doi = {10.1007/978-3-642-29011-4_42},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24253,
title = {Efficient Zero-Knowledge Argument for Correctness of a Shuffle},
author = {Stephanie Bayer and Jens Groth},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {263--280},
doi = {10.1007/978-3-642-29011-4_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24254,
title = {Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers},
author = {Yuanmi Chen and Phong Q. Nguyen},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {502--519},
doi = {10.1007/978-3-642-29011-4_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24255,
title = {Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers},
author = {Jean-S\'ebastien Coron and David Naccache and Mehdi Tibouchi},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {446--464},
doi = {10.1007/978-3-642-29011-4_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24256,
title = {Lattice Signatures without Trapdoors},
author = {Vadim Lyubashevsky},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {738--755},
doi = {10.1007/978-3-642-29011-4_43},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24257,
title = {Statistical Tools Flavor Side-Channel Collision Attacks},
author = {Amir Moradi},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {428--445},
doi = {10.1007/978-3-642-29011-4_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24258,
title = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model},
author = {Yannick Seurin},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {554--571},
doi = {10.1007/978-3-642-29011-4_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24259,
title = {Incremental Deterministic Public-Key Encryption},
author = {Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {628--644},
doi = {10.1007/978-3-642-29011-4_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24260,
title = {Another Look at Provable Security},
author = {Alfred Menezes},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {8},
doi = {10.1007/978-3-642-29011-4_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24261,
title = {Cryptanalyses on a Merkle-Damg\r ard Based MAC - Almost Universal Forgery and Distinguishing-H Attacks},
author = {Yu Sasaki},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {411--427},
doi = {10.1007/978-3-642-29011-4_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24262,
title = {Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security},
author = {Susan Hohenberger and Allison B. Lewko and Brent Waters},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {663--681},
doi = {10.1007/978-3-642-29011-4_39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24263,
title = {Group to Group Commitments Do Not Shrink},
author = {Masayuki Abe and Kristiyan Haralambiev and Miyako Ohkubo},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {301--317},
doi = {10.1007/978-3-642-29011-4_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24264,
title = {Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE},
author = {Gilad Asharov and Abhishek Jain and Adriana L\'opez-Alt and Eran Tromer and Vinod Vaikuntanathan and Daniel Wichs},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {483--501},
doi = {10.1007/978-3-642-29011-4_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24265,
title = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract)},
author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Fran\c cois-Xavier Standaert and John P. Steinberger and Elmar Tischhauser},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {45--62},
doi = {10.1007/978-3-642-29011-4_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24266,
title = {Fair Computation with Rational Players},
author = {Adam Groce and Jonathan Katz},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {81--98},
doi = {10.1007/978-3-642-29011-4_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24267,
title = {Narrow-Bicliques: Cryptanalysis of Full IDEA},
author = {Dmitry Khovratovich and Ga\"etan Leurent and Christian Rechberger},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {392--410},
doi = {10.1007/978-3-642-29011-4_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24268,
title = {Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting},
author = {Allison B. Lewko},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {318--335},
doi = {10.1007/978-3-642-29011-4_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24269,
title = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited},
author = {Orr Dunkelman and Nathan Keller and Adi Shamir},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {336--354},
doi = {10.1007/978-3-642-29011-4_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24270,
title = {Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields},
author = {Jean-Charles Faug\`ere and Ludovic Perret and Christophe Petit and Gu\'ena\"el Renault},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {27--44},
doi = {10.1007/978-3-642-29011-4_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24271,
title = {Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding},
author = {Anja Becker and Antoine Joux and Alexander May and Alexander Meurer},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {520--536},
doi = {10.1007/978-3-642-29011-4_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24272,
title = {Fully Homomorphic Encryption with Polylog Overhead},
author = {Craig Gentry and Shai Halevi and Nigel P. Smart},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {465--482},
doi = {10.1007/978-3-642-29011-4_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24273,
title = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption},
author = {Tatsuaki Okamoto and Katsuyuki Takashima},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {591--608},
doi = {10.1007/978-3-642-29011-4_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24274,
title = {Tightly-Secure Signatures from Lossy Identification Schemes},
author = {Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {572--590},
doi = {10.1007/978-3-642-29011-4_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24275,
title = {Optimal Security Proofs for Full Domain Hash, Revisited},
author = {Saqib A. Kakvi and Eike Kiltz},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {537--553},
doi = {10.1007/978-3-642-29011-4_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24276,
title = {A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract)},
author = {Antoine Joux},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {1--7},
doi = {10.1007/978-3-642-29011-4_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24277,
title = {Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller},
author = {Daniele Micciancio and Chris Peikert},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {700--718},
doi = {10.1007/978-3-642-29011-4_41},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24278,
title = {Scalable Group Signatures with Revocation},
author = {Beno\^\it Libert and Thomas Peters and Moti Yung},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {609--627},
doi = {10.1007/978-3-642-29011-4_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24279,
title = {Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading},
author = {Peter Gazi and Stefano Tessaro},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {63--80},
doi = {10.1007/978-3-642-29011-4_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24280,
title = {Property Preserving Symmetric Encryption},
author = {Omkant Pandey and Yannis Rouselakis},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {375--391},
doi = {10.1007/978-3-642-29011-4_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24281,
title = {Unconditionally-Secure Robust Secret Sharing with Compact Shares},
author = {Alfonso Cevallos and Serge Fehr and Rafail Ostrovsky and Yuval Rabani},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {195--208},
doi = {10.1007/978-3-642-29011-4_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{eurocrypt-2012-24282,
title = {On Round-Optimal Zero Knowledge in the Bare Public-Key Model},
author = {Alessandra Scafuro and Ivan Visconti},
booktitle = {EUROCRYPT},
volume = {7237},
pages = {153--171},
doi = {10.1007/978-3-642-29011-4_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@proceedings{eurocrypt-2012-24284,
title = {Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings},
booktitle = {EUROCRYPT},
volume = {7237},
url = {http://link.springer.com/book/10.1007/978-3-642-29011-4},
doi = {10.1007/978-3-642-29011-4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@proceedings{fse-2012-24458,
title = {Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
booktitle = {FSE},
volume = {7549},
url = {http://link.springer.com/book/10.1007/978-3-642-34047-5},
doi = {10.1007/978-3-642-34047-5},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24459,
title = {ElimLin Algorithm Revisited},
author = {Nicolas T. Courtois and Pouyan Sepehrdad and Petr Susil and Serge Vaudenay},
booktitle = {FSE},
volume = {7549},
pages = {306--325},
doi = {10.1007/978-3-642-34047-5_18},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24460,
title = {McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes},
author = {Ewan Fleischmann and Christian Forler and Stefan Lucks},
booktitle = {FSE},
volume = {7549},
pages = {196--215},
doi = {10.1007/978-3-642-34047-5_12},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24461,
title = {'Provable' Security against Differential and Linear Cryptanalysis},
author = {Kaisa Nyberg},
booktitle = {FSE},
volume = {7549},
pages = {1--8},
doi = {10.1007/978-3-642-34047-5_1},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24462,
title = {Improved Attacks on Full GOST},
author = {Itai Dinur and Orr Dunkelman and Adi Shamir},
booktitle = {FSE},
volume = {7549},
pages = {9--28},
doi = {10.1007/978-3-642-34047-5_2},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24463,
title = {Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2},
author = {Ji Li and Takanori Isobe and Kyoji Shibutani},
booktitle = {FSE},
volume = {7549},
pages = {264--286},
doi = {10.1007/978-3-642-34047-5_16},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24464,
title = {Higher-Order Masking Schemes for S-Boxes},
author = {Claude Carlet and Louis Goubin and Emmanuel Prouff and Michaël Quisquater and Matthieu Rivain},
booktitle = {FSE},
volume = {7549},
pages = {366--384},
doi = {10.1007/978-3-642-34047-5_21},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24465,
title = {New Attacks on Keccak-224 and Keccak-256},
author = {Itai Dinur and Orr Dunkelman and Adi Shamir},
booktitle = {FSE},
volume = {7549},
pages = {442--461},
doi = {10.1007/978-3-642-34047-5_25},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24466,
title = {Zero Correlation Linear Cryptanalysis with Reduced Data Complexity},
author = {Andrey Bogdanov and Meiqin Wang},
booktitle = {FSE},
volume = {7549},
pages = {29--48},
doi = {10.1007/978-3-642-34047-5_3},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24467,
title = {On the (In)Security of IDEA in Various Hashing Modes},
author = {Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang},
booktitle = {FSE},
volume = {7549},
pages = {163--179},
doi = {10.1007/978-3-642-34047-5_10},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24468,
title = {New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia},
author = {Ya Liu and Leibo Li and Dawu Gu and Xiaoyun Wang and Zhiqiang Liu and Jiazhe Chen and Wei Li 0013},
booktitle = {FSE},
volume = {7549},
pages = {90--109},
doi = {10.1007/978-3-642-34047-5_6},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24469,
title = {Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes},
author = {Markku-Juhani Olavi Saarinen},
booktitle = {FSE},
volume = {7549},
pages = {216--225},
doi = {10.1007/978-3-642-34047-5_13},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24470,
title = {A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract)},
author = {Jiqiang Lu},
booktitle = {FSE},
volume = {7549},
pages = {69--89},
doi = {10.1007/978-3-642-34047-5_5},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24471,
title = {Lapin: An Efficient Authentication Protocol Based on Ring-LPN},
author = {Stefan Heyse and Eike Kiltz and Vadim Lyubashevsky and Christof Paar and Krzysztof Pietrzak},
booktitle = {FSE},
volume = {7549},
pages = {346--365},
doi = {10.1007/978-3-642-34047-5_20},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24472,
title = {Differential Propagation Analysis of Keccak},
author = {Joan Daemen and Gilles Van Assche},
booktitle = {FSE},
volume = {7549},
pages = {422--441},
doi = {10.1007/978-3-642-34047-5_24},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24473,
title = {Recursive Diffusion Layers for Block Ciphers and Hash Functions},
author = {Mahdi Sajadieh and Mohammad Dakhilalian and Hamid Mala and Pouyan Sepehrdad},
booktitle = {FSE},
volume = {7549},
pages = {385--401},
doi = {10.1007/978-3-642-34047-5_22},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24474,
title = {Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family},
author = {Dmitry Khovratovich and Christian Rechberger and Alexandra Savelieva},
booktitle = {FSE},
volume = {7549},
pages = {244--263},
doi = {10.1007/978-3-642-34047-5_15},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24475,
title = {The Security of Ciphertext Stealing},
author = {Phillip Rogaway and Mark Wooding and Haibin Zhang},
booktitle = {FSE},
volume = {7549},
pages = {180--195},
doi = {10.1007/978-3-642-34047-5_11},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24476,
title = {Improved Rebound Attack on the Finalist Gr\østl},
author = {Jérémy Jean and Mar\'\ia Naya-Plasencia and Thomas Peyrin},
booktitle = {FSE},
volume = {7549},
pages = {110--126},
doi = {10.1007/978-3-642-34047-5_7},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24477,
title = {UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX},
author = {Vesselin Velichkov and Nicky Mouha and Christophe De Cannière and Bart Preneel},
booktitle = {FSE},
volume = {7549},
pages = {287--305},
doi = {10.1007/978-3-642-34047-5_17},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24478,
title = {(Pseudo) Preimage Attack on Round-Reduced Gr\østl Hash Function and Others},
author = {Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou},
booktitle = {FSE},
volume = {7549},
pages = {127--145},
doi = {10.1007/978-3-642-34047-5_8},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24479,
title = {Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128},
author = {Florian Mendel and Tomislav Nad and Martin Schl\"affer},
booktitle = {FSE},
volume = {7549},
pages = {226--243},
doi = {10.1007/978-3-642-34047-5_14},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24480,
title = {Practical Cryptanalysis of ARMADILLO2},
author = {Mar\'\ia Naya-Plasencia and Thomas Peyrin},
booktitle = {FSE},
volume = {7549},
pages = {146--162},
doi = {10.1007/978-3-642-34047-5_9},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24481,
title = {Unaligned Rebound Attack: Application to Keccak},
author = {Alexandre Duc and Jian Guo and Thomas Peyrin and Lei Wei},
booktitle = {FSE},
volume = {7549},
pages = {402--421},
doi = {10.1007/978-3-642-34047-5_23},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24482,
title = {A Model for Structure Attacks, with Applications to PRESENT and Serpent},
author = {Meiqin Wang and Yue Sun and Elmar Tischhauser and Bart Preneel},
booktitle = {FSE},
volume = {7549},
pages = {49--68},
doi = {10.1007/978-3-642-34047-5_4},
publisher = {Springer},
year = {2012}
}
@inproceedings{fse-2012-24483,
title = {Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication},
author = {Long Hoang Nguyen and A. W. Roscoe},
booktitle = {FSE},
volume = {7549},
pages = {326--345},
doi = {10.1007/978-3-642-34047-5_19},
publisher = {Springer},
year = {2012}
}
@inproceedings{pkc-2012-24337,
title = {Public-Key Identification Schemes Based on Multivariate Cubic Polynomials},
author = {Koichi Sakumoto},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {172--189},
doi = {10.1007/978-3-642-30057-8_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24338,
title = {The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles},
author = {Qiong Huang and Duncan S. Wong and Willy Susilo},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {120--137},
doi = {10.1007/978-3-642-30057-8_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24339,
title = {On Definitions of Selective Opening Security},
author = {Florian B\"ohl and Dennis Hofheinz and Daniel Kraschewski},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {522--539},
doi = {10.1007/978-3-642-30057-8_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24340,
title = {Generating Provable Primes Efficiently on Embedded Devices},
author = {Christophe Clavier and Benoit Feix and Lo\"\ic Thierry and Pascal Paillier},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {372--389},
doi = {10.1007/978-3-642-30057-8_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24341,
title = {Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices},
author = {Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {280--297},
doi = {10.1007/978-3-642-30057-8_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24342,
title = {Multi-location Leakage Resilient Cryptography},
author = {Ali Juma and Yevgeniy Vahlis and Moti Yung},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {504--521},
doi = {10.1007/978-3-642-30057-8_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24343,
title = {Strong Security from Probabilistic Signature Schemes},
author = {Sven Sch\"age},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {84--101},
doi = {10.1007/978-3-642-30057-8_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24344,
title = {Polly Cracker, Revisited, Revisited},
author = {Gottfried Herold},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {17--33},
doi = {10.1007/978-3-642-30057-8_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24345,
title = {Constant-Round Multi-party Private Set Union Using Reversed Laurent Series},
author = {Jae Hong Seo and Jung Hee Cheon and Jonathan Katz},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {398--412},
doi = {10.1007/978-3-642-30057-8_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24346,
title = {New Definitions and Separations for Circular Security},
author = {David Cash and Matthew Green and Susan Hohenberger},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {540--557},
doi = {10.1007/978-3-642-30057-8_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24347,
title = {From Selective to Full Security: Semi-generic Transformations in the Standard Model},
author = {Michel Abdalla and Dario Fiore and Vadim Lyubashevsky},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {316--333},
doi = {10.1007/978-3-642-30057-8_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24348,
title = {Space Efficient Signature Schemes from the RSA Assumption},
author = {Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {102--119},
doi = {10.1007/978-3-642-30057-8_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24349,
title = {Public Key Encryption against Related Key Attacks},
author = {Hoeteck Wee},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {262--279},
doi = {10.1007/978-3-642-30057-8_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24350,
title = {DDH-Like Assumptions Based on Extension Rings},
author = {Ronald Cramer and Ivan Damg\r ard and Eike Kiltz and Sarah Zakarias and Angela Zottarel},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {644--661},
doi = {10.1007/978-3-642-30057-8_38},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24351,
title = {NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model},
author = {Ron Steinfeld and San Ling and Josef Pieprzyk and Christophe Tartary and Huaxiong Wang},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {353--371},
doi = {10.1007/978-3-642-30057-8_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24352,
title = {Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods},
author = {Aur\'elie Bauer and Damien Vergnaud and Jean-Christophe Zapalowicz},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {609--626},
doi = {10.1007/978-3-642-30057-8_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24353,
title = {Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices},
author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {467--484},
doi = {10.1007/978-3-642-30057-8_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24354,
title = {Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies},
author = {Emil Stefanov and Elaine Shi and Dawn Song},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {413--430},
doi = {10.1007/978-3-642-30057-8_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24355,
title = {Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts},
author = {Nelly Fazio and Irippuge Milinda Perera},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {225--242},
doi = {10.1007/978-3-642-30057-8_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24356,
title = {Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication},
author = {Shota Yamada and Nuttapong Attrapadung and Bagus Santoso and Jacob C. N. Schuldt and Goichiro Hanaoka and Noboru Kunihiro},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {243--261},
doi = {10.1007/978-3-642-30057-8_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24357,
title = {Correlated Product Security from Any One-Way Function},
author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {558--575},
doi = {10.1007/978-3-642-30057-8_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24358,
title = {Password-Based Authenticated Key Exchange},
author = {David Pointcheval},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {390--397},
doi = {10.1007/978-3-642-30057-8_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24359,
title = {Waters Signatures with Optimal Security Reduction},
author = {Dennis Hofheinz and Tibor Jager and Edward Knapp},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {66--83},
doi = {10.1007/978-3-642-30057-8_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24360,
title = {Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract)},
author = {Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {298--315},
doi = {10.1007/978-3-642-30057-8_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24361,
title = {Ring-LWE in Polynomial Rings},
author = {Léo Ducas and Alain Durmus},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {34--51},
doi = {10.1007/978-3-642-30057-8_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24362,
title = {Extended-DDH and Lossy Trapdoor Functions},
author = {Brett Hemenway and Rafail Ostrovsky},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {627--643},
doi = {10.1007/978-3-642-30057-8_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24363,
title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking},
author = {Yusuke Sakai and Jacob C. N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {715--732},
doi = {10.1007/978-3-642-30057-8_42},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24364,
title = {Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited},
author = {Enrico Thomae and Christopher Wolf},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {156--171},
doi = {10.1007/978-3-642-30057-8_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24365,
title = {Better Bootstrapping in Fully Homomorphic Encryption},
author = {Craig Gentry and Shai Halevi and Nigel P. Smart},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {1--16},
doi = {10.1007/978-3-642-30057-8_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24366,
title = {Security of Blind Signatures Revisited},
author = {Dominique Schr\"oder and Dominique Unruh},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {662--679},
doi = {10.1007/978-3-642-30057-8_39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24367,
title = {Efficient Password Authenticated Key Exchange via Oblivious Transfer},
author = {Ran Canetti and Dana Dachman-Soled and Vinod Vaikuntanathan and Hoeteck Wee},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {449--466},
doi = {10.1007/978-3-642-30057-8_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24368,
title = {Public-Key Cryptography from New Multivariate Quadratic Assumptions},
author = {Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {190--205},
doi = {10.1007/978-3-642-30057-8_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24369,
title = {On Homomorphic Encryption and Chosen-Ciphertext Security},
author = {Brett Hemenway and Rafail Ostrovsky},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {52--65},
doi = {10.1007/978-3-642-30057-8_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24370,
title = {Efficiently Shuffling in Public},
author = {Udaya Parampalli and Kim Ramchen and Vanessa Teague},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {431--448},
doi = {10.1007/978-3-642-30057-8_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24371,
title = {Improved Security for Linearly Homomorphic Signatures: A Generic Framework},
author = {David Mandell Freeman},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {697--714},
doi = {10.1007/978-3-642-30057-8_41},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24372,
title = {Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve},
author = {Yumi Sakemi and Goichiro Hanaoka and Tetsuya Izu and Masahiko Takenaka and Masaya Yasuda},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {595--608},
doi = {10.1007/978-3-642-30057-8_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24373,
title = {Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms},
author = {Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {576--594},
doi = {10.1007/978-3-642-30057-8_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24374,
title = {Circular and KDM Security for Identity-Based Encryption},
author = {Jacob Alperin-Sheriff and Chris Peikert},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {334--352},
doi = {10.1007/978-3-642-30057-8_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24375,
title = {Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes},
author = {Pierre-Louis Cayrel and Gerhard Hoffmann and Edoardo Persichetti},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {138--155},
doi = {10.1007/978-3-642-30057-8_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24376,
title = {Efficient Network Coding Signatures in the Standard Model},
author = {Dario Catalano and Dario Fiore and Bogdan Warinschi},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {680--696},
doi = {10.1007/978-3-642-30057-8_40},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24377,
title = {Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model},
author = {Beno\^\it Libert and Kenneth G. Paterson and Elizabeth A. Quaglia},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {206--224},
doi = {10.1007/978-3-642-30057-8_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{pkc-2012-24378,
title = {Relatively-Sound NIZKs and Password-Based Key-Exchange},
author = {Charanjit S. Jutla and Arnab Roy},
booktitle = {Public Key Cryptography - PKC 2012},
volume = {7293},
pages = {485--503},
doi = {10.1007/978-3-642-30057-8_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@proceedings{pkc-2012-24778,
title = {Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings},
booktitle = {PKC},
volume = {7293},
doi = {10.1007/978-3-642-30057-8},
publisher = {Springer},
year = {2012}
}
@inproceedings{tcc-2012-24204,
title = {On the Security of the 'Free-XOR' Technique},
author = {Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Hong-Sheng Zhou},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {39--53},
doi = {10.1007/978-3-642-28914-9_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24205,
title = {On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction},
author = {Avradip Mandal and Jacques Patarin and Yannick Seurin},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {285--302},
doi = {10.1007/978-3-642-28914-9_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24206,
title = {Computational Extractors and Pseudorandomness},
author = {Dana Dachman-Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {383--403},
doi = {10.1007/978-3-642-28914-9_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24207,
title = {How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption},
author = {Bryan Parno and Mariana Raykova and Vinod Vaikuntanathan},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {422--439},
doi = {10.1007/978-3-642-28914-9_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24208,
title = {Point Obfuscation and 3-Round Zero-Knowledge},
author = {Nir Bitansky and Omer Paneth},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {190--208},
doi = {10.1007/978-3-642-28914-9_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24209,
title = {Leakage-Resilient Circuits without Computational Assumptions},
author = {Stefan Dziembowski and Sebastian Faust},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {230--247},
doi = {10.1007/978-3-642-28914-9_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24210,
title = {Identifying Cheaters without an Honest Majority},
author = {Yuval Ishai and Rafail Ostrovsky and Hakan Seyalioglu},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {21--38},
doi = {10.1007/978-3-642-28914-9_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24211,
title = {From Non-adaptive to Adaptive Pseudorandom Functions},
author = {Itay Berman and Iftach Haitner},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {357--368},
doi = {10.1007/978-3-642-28914-9_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24212,
title = {On Efficient Zero-Knowledge PCPs},
author = {Yuval Ishai and Mohammad Mahmoody and Amit Sahai},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {151--168},
doi = {10.1007/978-3-642-28914-9_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24213,
title = {Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures},
author = {Jae Hong Seo and Jung Hee Cheon},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {133--150},
doi = {10.1007/978-3-642-28914-9_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24214,
title = {On the Instantiability of Hash-and-Sign RSA Signatures},
author = {Yevgeniy Dodis and Iftach Haitner and Aris Tentes},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {112--132},
doi = {10.1007/978-3-642-28914-9_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24215,
title = {Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments},
author = {Helger Lipmaa},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {169--189},
doi = {10.1007/978-3-642-28914-9_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24216,
title = {Confidentiality and Integrity: A Constructive Perspective},
author = {Ueli M. Maurer and Andreas R\"uedlinger and Bj\"orn Tackmann},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {209--229},
doi = {10.1007/978-3-642-28914-9_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24217,
title = {Computing on Authenticated Data},
author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {1--20},
doi = {10.1007/978-3-642-28914-9_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24218,
title = {On Black-Box Reductions between Predicate Encryption Schemes},
author = {Vipul Goyal and Virendra Kumar and Satyanarayana V. Lokam and Mohammad Mahmoody},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {440--457},
doi = {10.1007/978-3-642-28914-9_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24219,
title = {Lossy Functions Do Not Amplify Well},
author = {Krzysztof Pietrzak and Alon Rosen and Gil Segev},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {458--475},
doi = {10.1007/978-3-642-28914-9_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24220,
title = {Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations},
author = {Dario Fiore and Dominique Schr\"oder},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {636--653},
doi = {10.1007/978-3-642-28914-9_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24221,
title = {A Parallel Repetition Theorem for Leakage Resilience},
author = {Zvika Brakerski and Yael Tauman Kalai},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {248--265},
doi = {10.1007/978-3-642-28914-9_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24222,
title = {Secure Two-Party Computation with Low Communication},
author = {Ivan Damg\r ard and Sebastian Faust and Carmit Hazay},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {54--74},
doi = {10.1007/978-3-642-28914-9_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24223,
title = {Resettable Statistical Zero Knowledge},
author = {Sanjam Garg and Rafail Ostrovsky and Ivan Visconti and Akshay Wadia},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {494--511},
doi = {10.1007/978-3-642-28914-9_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24224,
title = {Simultaneously Resettable Arguments of Knowledge},
author = {Chongwon Cho and Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {530--547},
doi = {10.1007/978-3-642-28914-9_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24225,
title = {The Knowledge Tightness of Parallel Zero-Knowledge},
author = {Kai-Min Chung and Rafael Pass and Wei-Lung Dustin Tseng},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {512--529},
doi = {10.1007/978-3-642-28914-9_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24226,
title = {Bounded-Collusion IBE from Key Homomorphism},
author = {Shafi Goldwasser and Allison B. Lewko and David A. Wilson},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {564--581},
doi = {10.1007/978-3-642-28914-9_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24227,
title = {Leakage-Tolerant Interactive Protocols},
author = {Nir Bitansky and Ran Canetti and Shai Halevi},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {266--284},
doi = {10.1007/978-3-642-28914-9_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24228,
title = {Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources},
author = {Yevgeniy Dodis and Thomas Ristenpart and Salil P. Vadhan},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {618--635},
doi = {10.1007/978-3-642-28914-9_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24229,
title = {Functional Re-encryption and Collusion-Resistant Obfuscation},
author = {Nishanth Chandran and Melissa Chase and Vinod Vaikuntanathan},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {404--421},
doi = {10.1007/978-3-642-28914-9_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24230,
title = {Iterative Constructions and Private Data Release},
author = {Anupam Gupta and Aaron Roth and Jonathan Ullman},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {339--356},
doi = {10.1007/978-3-642-28914-9_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24231,
title = {Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry},
author = {Dimitar Jetchev and Onur \"Ozen and Martijn Stam},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {303--320},
doi = {10.1007/978-3-642-28914-9_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24232,
title = {Hardness Preserving Constructions of Pseudorandom Functions},
author = {Abhishek Jain and Krzysztof Pietrzak and Aris Tentes},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {369--382},
doi = {10.1007/978-3-642-28914-9_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24233,
title = {A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy},
author = {Benjamin Fuller and Adam O'Neill and Leonid Reyzin},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {582--599},
doi = {10.1007/978-3-642-28914-9_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24234,
title = {A Dichotomy for Local Small-Bias Generators},
author = {Benny Applebaum and Andrej Bogdanov and Alon Rosen},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {600--617},
doi = {10.1007/978-3-642-28914-9_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24235,
title = {Subspace LWE},
author = {Krzysztof Pietrzak},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {548--563},
doi = {10.1007/978-3-642-28914-9_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24236,
title = {Lower Bounds in Differential Privacy},
author = {Anindya De},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {321--338},
doi = {10.1007/978-3-642-28914-9_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24237,
title = {Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions},
author = {Beno\^\it Libert and Moti Yung},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {75--93},
doi = {10.1007/978-3-642-28914-9_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24238,
title = {Counterexamples to Hardness Amplification beyond Negligible},
author = {Yevgeniy Dodis and Abhishek Jain and Tal Moran and Daniel Wichs},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {476--493},
doi = {10.1007/978-3-642-28914-9_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{tcc-2012-24239,
title = {Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions},
author = {Olivier Blazy and David Pointcheval and Damien Vergnaud},
booktitle = {Theory of Cryptography},
volume = {7194},
pages = {94--111},
doi = {10.1007/978-3-642-28914-9_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@proceedings{tcc-2012-24285,
title = {Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
booktitle = {Theory of Cryptography},
volume = {7194},
url = {http://link.springer.com/book/10.1007/978-3-642-28914-9},
doi = {10.1007/978-3-642-28914-9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2012}
}
@inproceedings{asiacrypt-2011-24103,
title = {Program Obfuscation with Leaky Hardware},
author = {Nir Bitansky and Ran Canetti and Shafi Goldwasser and Shai Halevi and Yael Tauman Kalai and Guy N. Rothblum},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {722--739},
doi = {10.1007/978-3-642-25385-0_39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24104,
title = {Counting Points on Genus 2 Curves with Real Multiplication},
author = {Pierrick Gaudry and David R. Kohel and Benjamin A. Smith},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {504--519},
doi = {10.1007/978-3-642-25385-0_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24105,
title = {A Framework for Practical Universally Composable Zero-Knowledge Protocols},
author = {Jan Camenisch and Stephan Krenn and Victor Shoup},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {449--467},
doi = {10.1007/978-3-642-25385-0_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24106,
title = {Structure Preserving CCA Secure Encryption and Applications},
author = {Jan Camenisch and Kristiyan Haralambiev and Markulf Kohlweiss and Jorn Lapon and Vincent Naessens},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {89--106},
doi = {10.1007/978-3-642-25385-0_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24107,
title = {The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy},
author = {Divesh Aggarwal and Ueli M. Maurer},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {686--701},
doi = {10.1007/978-3-642-25385-0_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24108,
title = {The Preimage Security of Double-Block-Length Compression Functions},
author = {Frederik Armknecht and Ewan Fleischmann and Matthias Krause and Jooyoung Lee and Martijn Stam and John P. Steinberger},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {233--251},
doi = {10.1007/978-3-642-25385-0_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24109,
title = {Polly Cracker, Revisited},
author = {Martin R. Albrecht and Pooya Farshim and Jean-Charles Faug\`ere and Ludovic Perret},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {179--196},
doi = {10.1007/978-3-642-25385-0_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24110,
title = {Rebound Attack on JH42},
author = {Mar\'\ia Naya-Plasencia and Deniz Toz and Kerem Varici},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {252--269},
doi = {10.1007/978-3-642-25385-0_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24111,
title = {Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol},
author = {Kenneth G. Paterson and Thomas Ristenpart and Thomas Shrimpton},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {372--389},
doi = {10.1007/978-3-642-25385-0_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24112,
title = {Practical Key-Recovery for All Possible Parameters of SFLASH},
author = {Charles Bouillaguet and Pierre-Alain Fouque and Gilles Macario-Rat},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {667--685},
doi = {10.1007/978-3-642-25385-0_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24113,
title = {Constant-Round Private Function Evaluation with Linear Complexity},
author = {Jonathan Katz and Lior Malka},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {556--571},
doi = {10.1007/978-3-642-25385-0_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24114,
title = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware},
author = {Itai Dinur and Tim G\"uneysu and Christof Paar and Adi Shamir and Ralf Zimmermann},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {327--343},
doi = {10.1007/978-3-642-25385-0_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24115,
title = {Second-Order Differential Collisions for Reduced SHA-256},
author = {Alex Biryukov and Mario Lamberger and Florian Mendel and Ivica Nikolic},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {270--287},
doi = {10.1007/978-3-642-25385-0_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24116,
title = {Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security},
author = {Chao Ning and Qiuliang Xu},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {572--589},
doi = {10.1007/978-3-642-25385-0_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24117,
title = {Biclique Cryptanalysis of the Full AES},
author = {Andrey Bogdanov and Dmitry Khovratovich and Christian Rechberger},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {344--371},
doi = {10.1007/978-3-642-25385-0_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24118,
title = {Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions},
author = {Florian Mendel and Tomislav Nad and Martin Schl\"affer},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {288--307},
doi = {10.1007/978-3-642-25385-0_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24119,
title = {Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge},
author = {Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {390--406},
doi = {10.1007/978-3-642-25385-0_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24120,
title = {On the Joint Security of Encryption and Signature, Revisited},
author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Martijn Stam and Susan Thomson},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {161--178},
doi = {10.1007/978-3-642-25385-0_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24121,
title = {Lower and Upper Bounds for Deniable Public-Key Encryption},
author = {Rikke Bendlin and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {125--142},
doi = {10.1007/978-3-642-25385-0_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24122,
title = {BiTR: Built-in Tamper Resilience},
author = {Seung Geol Choi and Aggelos Kiayias and Tal Malkin},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {740--758},
doi = {10.1007/978-3-642-25385-0_40},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24123,
title = {Efficient Zero-Knowledge Arguments from Two-Tiered Homomorphic Commitments},
author = {Jens Groth},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {431--448},
doi = {10.1007/978-3-642-25385-0_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24124,
title = {Functional Encryption for Inner Product Predicates from Learning with Errors},
author = {Shweta Agrawal and David Mandell Freeman and Vinod Vaikuntanathan},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {21--40},
doi = {10.1007/978-3-642-25385-0_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24125,
title = {Two Provers in Isolation},
author = {Claude Cr\'epeau and Louis Salvail and Jean-Raymond Simard and Alain Tapp},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {407--430},
doi = {10.1007/978-3-642-25385-0_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24126,
title = {Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security},
author = {Marc Fischlin and Beno\^\it Libert and Mark Manulis},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {468--485},
doi = {10.1007/978-3-642-25385-0_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24127,
title = {Cryptanalysis of ARMADILLO2},
author = {Mohamed Ahmed Abdelraheem and C\'eline Blondeau and Mar\'\ia Naya-Plasencia and Marion Videau and Erik Zenner},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {308--326},
doi = {10.1007/978-3-642-25385-0_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24128,
title = {Secure Communication in Multicast Graphs},
author = {Qiushi Yang and Yvo Desmedt},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {538--555},
doi = {10.1007/978-3-642-25385-0_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24129,
title = {Separating Short Structure-Preserving Signatures from Non-interactive Assumptions},
author = {Masayuki Abe and Jens Groth and Miyako Ohkubo},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {628--646},
doi = {10.1007/978-3-642-25385-0_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24130,
title = {Cryptography Secure against Related-Key Attacks and Tampering},
author = {Mihir Bellare and David Cash and Rachel Miller},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {486--503},
doi = {10.1007/978-3-642-25385-0_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24131,
title = {Leakage-Resilient Cryptography from the Inner-Product Extractor},
author = {Stefan Dziembowski and Sebastian Faust},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {702--721},
doi = {10.1007/978-3-642-25385-0_38},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24132,
title = "Decoding Random Linear Codes in $\tilde{\mathcal{O}}(2^{0.054n})$",
author = {Alexander May and Alexander Meurer and Enrico Thomae},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {107--124},
doi = {10.1007/978-3-642-25385-0_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24133,
title = {Computational Verifiable Secret Sharing Revisited},
author = {Michael Backes and Aniket Kate and Arpita Patra},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {590--609},
doi = {10.1007/978-3-642-25385-0_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24134,
title = {Natural Generalizations of Threshold Secret Sharing},
author = {Oriol Farr\`as and Carles Padr\'o and Chaoping Xing and An Yang},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {610--627},
doi = {10.1007/978-3-642-25385-0_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24135,
title = {Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security},
author = {Brett Hemenway and Beno\^\it Libert and Rafail Ostrovsky and Damien Vergnaud},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {70--88},
doi = {10.1007/978-3-642-25385-0_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24136,
title = {Random Oracles in a Quantum World},
author = {Dan Boneh and \"Ozg\"ur Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {41--69},
doi = {10.1007/978-3-642-25385-0_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24137,
title = {BKZ 2.0: Better Lattice Security Estimates},
author = {Yuanmi Chen and Phong Q. Nguyen},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {1--20},
doi = {10.1007/978-3-642-25385-0_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24138,
title = {Bridging Broadcast Encryption and Group Key Agreement},
author = {Qianhong Wu and Bo Qin and Lei Zhang and Josep Domingo-Ferrer and Oriol Farr\`as},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {143--160},
doi = {10.1007/978-3-642-25385-0_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24139,
title = {Noiseless Database Privacy},
author = {Raghav Bhaskar and Abhishek Bhowmick and Vipul Goyal and Srivatsan Laxman and Abhradeep Thakurta},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {215--232},
doi = {10.1007/978-3-642-25385-0_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24140,
title = {Short Signatures from Weaker Assumptions},
author = {Dennis Hofheinz and Tibor Jager and Eike Kiltz},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {647--666},
doi = {10.1007/978-3-642-25385-0_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24141,
title = {Oblivious RAM with O((logN)3) Worst-Case Cost},
author = {Elaine Shi and T.-H. Hubert Chan and Emil Stefanov and Mingfei Li},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {197--214},
doi = {10.1007/978-3-642-25385-0_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2011-24142,
title = {On the Efficiency of Bit Commitment Reductions},
author = {Samuel Ranellucci and Alain Tapp and Severin Winkler and J\"urg Wullschleger},
booktitle = {ASIACRYPT},
volume = {7073},
pages = {520--537},
doi = {10.1007/978-3-642-25385-0_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@proceedings{asiacrypt-2011-24781,
title = {Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings},
booktitle = {ASIACRYPT},
volume = {7073},
doi = {10.1007/978-3-642-25385-0},
publisher = {Springer},
year = {2011}
}
@inproceedings{ches-2011-24070,
title = {On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting},
author = {Amir Moradi and Oliver Mischke and Christof Paar and Yang Li and Kazuo Ohta and Kazuo Sakiyama},
booktitle = {CHES},
volume = {6917},
pages = {292--311},
doi = {10.1007/978-3-642-23951-9_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24071,
title = {Meet-in-the-Middle and Impossible Differential Fault Analysis on AES},
author = {Patrick Derbez and Pierre-Alain Fouque and Delphine Leresteux},
booktitle = {CHES},
volume = {6917},
pages = {274--291},
doi = {10.1007/978-3-642-23951-9_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24072,
title = {FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction},
author = {Ray C. C. Cheung and Sylvain Duquesne and Junfeng Fan and Nicolas Guillermin and Ingrid Verbauwhede and Gavin Xiaoxu Yao},
booktitle = {CHES},
volume = {6917},
pages = {421--441},
doi = {10.1007/978-3-642-23951-9_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24073,
title = {Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols},
author = {Emmanuel Prouff and Thomas Roche},
booktitle = {CHES},
volume = {6917},
pages = {63--78},
doi = {10.1007/978-3-642-23951-9_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24074,
title = {Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors},
author = {Michael Hutter and Erich Wenger},
booktitle = {CHES},
volume = {6917},
pages = {459--474},
doi = {10.1007/978-3-642-23951-9_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24075,
title = {Extractors against Side-Channel Attacks: Weak or Strong?},
author = {Marcel Medwed and Fran\c cois-Xavier Standaert},
booktitle = {CHES},
volume = {6917},
pages = {256--272},
doi = {10.1007/978-3-642-23951-9_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24076,
title = "Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems",
author = {Albrecht Petzoldt and Enrico Thomae and Stanislav Bulygin and Christopher Wolf},
booktitle = {CHES},
volume = {6917},
pages = {475--490},
doi = {10.1007/978-3-642-23951-9_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24077,
title = {Standardization Works for Security Regarding the Electromagnetic Environment},
author = {Tetsuya Tominaga},
booktitle = {CHES},
volume = {6917},
pages = {273},
doi = {10.1007/978-3-642-23951-9_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24078,
title = {Recyclable PUFs: Logically Reconfigurable PUFs},
author = {Stefan Katzenbeisser and \"Unal Ko\c cabas and Vincent van der Leest and Ahmad-Reza Sadeghi and Geert Jan Schrijen and Heike Schr\"oder and Christian Wachsmann},
booktitle = {CHES},
volume = {6917},
pages = {374--389},
doi = {10.1007/978-3-642-23951-9_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24079,
title = {High Speed Cryptoprocessor for Î· T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields},
author = {Santosh Ghosh and Dipanwita Roy Chowdhury and Abhijit Das},
booktitle = {CHES},
volume = {6917},
pages = {442--458},
doi = {10.1007/978-3-642-23951-9_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24080,
title = {Protecting AES with Shamir's Secret Sharing Scheme},
author = {Louis Goubin and Ange Martinelli},
booktitle = {CHES},
volume = {6917},
pages = {79--94},
doi = {10.1007/978-3-642-23951-9_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24081,
title = {Random Sampling for Short Lattice Vectors on Graphics Cards},
author = {Michael Schneider and Norman G\"ottert},
booktitle = {CHES},
volume = {6917},
pages = {160--175},
doi = {10.1007/978-3-642-23951-9_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24082,
title = {Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box},
author = {Mathieu Renauld and Dina Kamel and Fran\c cois-Xavier Standaert and Denis Flandre},
booktitle = {CHES},
volume = {6917},
pages = {223--239},
doi = {10.1007/978-3-642-23951-9_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24083,
title = {Lightweight and Secure PUF Key Storage Using Limits of Machine Learning},
author = {Meng-Day (Mandel) Yu and David M'Ra\"\ihi and Richard Sowell and Srinivas Devadas},
booktitle = {CHES},
volume = {6917},
pages = {358--373},
doi = {10.1007/978-3-642-23951-9_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24084,
title = {Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -},
author = {Po-Chun Kuo and Michael Schneider and \"Ozg\"ur Dagdelen and Jan Reichelt and Johannes Buchmann and Chen-Mou Cheng and Bo-Yin Yang},
booktitle = {CHES},
volume = {6917},
pages = {176--191},
doi = {10.1007/978-3-642-23951-9_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24085,
title = {Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World},
author = {David Oswald and Christof Paar},
booktitle = {CHES},
volume = {6917},
pages = {207--222},
doi = {10.1007/978-3-642-23951-9_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24086,
title = {Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication},
author = {Jonathan Taverne and Armando Faz-Hern\'andez and Diego F. Aranha and Francisco Rodr\'\iguez-Henr\'\iquez and Darrel Hankerson and Julio L\'opez},
booktitle = {CHES},
volume = {6917},
pages = {108--123},
doi = {10.1007/978-3-642-23951-9_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24087,
title = {Modulus Fault Attacks against RSA-CRT Signatures},
author = {Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi},
booktitle = {CHES},
volume = {6917},
pages = {192--206},
doi = {10.1007/978-3-642-23951-9_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24088,
title = {Piccolo: An Ultra-Lightweight Blockcipher},
author = {Kyoji Shibutani and Takanori Isobe and Harunaga Hiwatari and Atsushi Mitsuda and Toru Akishita and Taizo Shirai},
booktitle = {CHES},
volume = {6917},
pages = {342--357},
doi = {10.1007/978-3-642-23951-9_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24089,
title = {A Fast and Provably Secure Higher-Order Masking of AES S-Box},
author = {HeeSeok Kim and Seokhie Hong and Jongin Lim},
booktitle = {CHES},
volume = {6917},
pages = {95--107},
doi = {10.1007/978-3-642-23951-9_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24090,
title = {Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAs},
author = {Ekawat Homsirikamol and Marcin Rogawski and Kris Gaj},
booktitle = {CHES},
volume = {6917},
pages = {491--506},
doi = {10.1007/978-3-642-23951-9_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24091,
title = {High-Speed High-Security Signatures},
author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
booktitle = {CHES},
volume = {6917},
pages = {124--142},
doi = {10.1007/978-3-642-23951-9_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24092,
title = {FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control},
author = {Mehrdad Majzoobi and Farinaz Koushanfar and Srinivas Devadas},
booktitle = {CHES},
volume = {6917},
pages = {17--32},
doi = {10.1007/978-3-642-23951-9_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24093,
title = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings},
author = {Laurie Genelle and Emmanuel Prouff and Micha\"el Quisquater},
booktitle = {CHES},
volume = {6917},
pages = {240--255},
doi = {10.1007/978-3-642-23951-9_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24094,
title = {Efficient Hashing Using the AES Instruction Set},
author = {Joppe W. Bos and Onur \"Ozen and Martijn Stam},
booktitle = {CHES},
volume = {6917},
pages = {507--522},
doi = {10.1007/978-3-642-23951-9_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24095,
title = {An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension},
author = {Philipp Grabher and Johann Gro\sssch\"adl and Simon Hoerder and Kimmo J\"arvinen and Dan Page and Stefan Tillich and Marcin W\'ojcik},
booktitle = {CHES},
volume = {6917},
pages = {1--16},
doi = {10.1007/978-3-642-23951-9_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24096,
title = {Generic Side-Channel Countermeasures for Reconfigurable Devices},
author = {Tim G\"uneysu and Amir Moradi},
booktitle = {CHES},
volume = {6917},
pages = {33--48},
doi = {10.1007/978-3-642-23951-9_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24097,
title = {MECCA: A Robust Low-Overhead PUF Using Embedded Memory Array},
author = {Aswin Raghav Krishna and Seetharam Narasimhan and Xinmu Wang and Swarup Bhunia},
booktitle = {CHES},
volume = {6917},
pages = {407--420},
doi = {10.1007/978-3-642-23951-9_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24098,
title = {spongent: A Lightweight Hash Function},
author = {Andrey Bogdanov and Miroslav Knezevic and Gregor Leander and Deniz Toz and Kerem Varici and Ingrid Verbauwhede},
booktitle = {CHES},
volume = {6917},
pages = {312--325},
doi = {10.1007/978-3-642-23951-9_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24099,
title = {The LED Block Cipher},
author = {Jian Guo and Thomas Peyrin and Axel Poschmann and Matthew J. B. Robshaw},
booktitle = {CHES},
volume = {6917},
pages = {326--341},
doi = {10.1007/978-3-642-23951-9_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24100,
title = {Improved Collision-Correlation Power Analysis on First Order Protected AES},
author = {Christophe Clavier and Benoit Feix and Georges Gagnerot and Myl\`ene Roussellet and Vincent Verneuil},
booktitle = {CHES},
volume = {6917},
pages = {49--62},
doi = {10.1007/978-3-642-23951-9_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24101,
title = {To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order},
author = {Junfeng Fan and Benedikt Gierlichs and Frederik Vercauteren},
booktitle = {CHES},
volume = {6917},
pages = {143--159},
doi = {10.1007/978-3-642-23951-9_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{ches-2011-24102,
title = {Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches},
author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Takao Ochiai and Masahiko Takenaka and Kouichi Itoh},
booktitle = {CHES},
volume = {6917},
pages = {390--406},
doi = {10.1007/978-3-642-23951-9_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@proceedings{ches-2011-24780,
title = {Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
booktitle = {CHES},
volume = {6917},
doi = {10.1007/978-3-642-23951-9},
publisher = {Springer},
year = {2011}
}
@inproceedings{crypto-2011-23565,
title = {Leftover Hash Lemma, Revisited},
author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Fran\c cois-Xavier Standaert and Yu Yu},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {1},
doi = {10.1007/978-3-642-22792-9_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23566,
title = {Random Oracle Reducibility},
author = {Paul Baecher and Marc Fischlin},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {21},
doi = {10.1007/978-3-642-22792-9_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23567,
title = {Time-Lock Puzzles in the Random Oracle Model},
author = {Mohammad Mahmoody and Tal Moran and Salil P. Vadhan},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {39},
doi = {10.1007/978-3-642-22792-9_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23568,
title = {Physically Uncloneable Functions in the Universal Composition Framework},
author = {Christina Brzuska and Marc Fischlin and Heike Schr\"oder and Stefan Katzenbeisser},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {51},
doi = {10.1007/978-3-642-22792-9_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23569,
title = {Computer-Aided Security Proofs for the Working Cryptographer},
author = {Gilles Barthe and Benjamin Gr\'egoire and Sylvain Heraud and Santiago Zanella-B\'eguelin},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {71},
doi = {10.1007/978-3-642-22792-9_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23570,
title = {Optimal Verification of Operations on Dynamic Sets},
author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {91},
doi = {10.1007/978-3-642-22792-9_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23571,
title = {Verifiable Delegation of Computation over Large Datasets},
author = {Siavosh Benabbas and Rosario Gennaro and Yevgeniy Vahlis},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {110},
doi = {10.1007/978-3-642-22792-9_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23572,
title = {Secure Computation on the Web: Computing without Simultaneous Interaction},
author = {Shai Halevi and Yehuda Lindell and Benny Pinkas},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {128},
doi = {10.1007/978-3-642-22792-9_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23573,
title = {Memory Delegation},
author = {Kai-Min Chung and Yael Kalai and Feng-Hao Liu and Ran Raz},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {147},
doi = {10.1007/978-3-642-22792-9_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23574,
title = {Automatic Search of Attacks on Round-Reduced AES and Applications},
author = {Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {165},
doi = {10.1007/978-3-642-22792-9_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23575,
title = {How to Improve Rebound Attacks},
author = {Mar\'\ia Naya-Plasencia},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {184},
doi = {10.1007/978-3-642-22792-9_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23576,
title = {A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack},
author = {Gregor Leander and Mohamed Ahmed Abdelraheem and Hoda AlKhzaimi and Erik Zenner},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {202},
doi = {10.1007/978-3-642-22792-9_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23577,
title = {The PHOTON Family of Lightweight Hash Functions},
author = {Jian Guo and Thomas Peyrin and Axel Poschmann},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {219},
doi = {10.1007/978-3-642-22792-9_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23578,
title = {Perfectly-Secure Multiplication for any t\<n/3},
author = {Gilad Asharov and Yehuda Lindell and Tal Rabin},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {237},
doi = {10.1007/978-3-642-22792-9_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23579,
title = {The IPS Compiler: Optimizations, Variants and Concrete Efficiency},
author = {Yehuda Lindell and Eli Oxman and Benny Pinkas},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {255},
doi = {10.1007/978-3-642-22792-9_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23580,
title = {$1/p$-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds},
author = {Amos Beimel and Yehuda Lindell and Eran Omri and Ilan Orlov},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {273},
doi = {10.1007/978-3-642-22792-9_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23581,
title = {Leakage-Resilient Zero Knowledge},
author = {Sanjam Garg and Abhishek Jain and Amit Sahai},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {293},
doi = {10.1007/978-3-642-22792-9_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23582,
title = {A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework},
author = {Carolyn Whitnall and Elisabeth Oswald},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {311},
doi = {10.1007/978-3-642-22792-9_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23583,
title = {Key-Evolution Schemes Resilient to Space-Bounded Leakage},
author = {Stefan Dziembowski and Tomasz Kazana and Daniel Wichs},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {330},
doi = {10.1007/978-3-642-22792-9_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23584,
title = {Generic Side-Channel Distinguishers: Improvements and Limitations},
author = {Nicolas Veyrat-Charvillon and Fran\c cois-Xavier Standaert},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {348},
doi = {10.1007/978-3-642-22792-9_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23585,
title = {Cryptography with Tamperable and Leaky Memory},
author = {Yael Tauman Kalai and Bhavana Kanukurthi and Amit Sahai},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {367},
doi = {10.1007/978-3-642-22792-9_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23586,
title = {Merkle Puzzles in a Quantum World},
author = {Gilles Brassard and Peter H\oyer and Kassem Kalach and Marc Kaplan and Sophie Laplante and Louis Salvail},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {385},
doi = {10.1007/978-3-642-22792-9_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23587,
title = {Classical Cryptographic Protocols in a Quantum World},
author = {Sean Hallgren and Adam Smith and Fang Song},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {405},
doi = {10.1007/978-3-642-22792-9_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23588,
title = {Position-Based Quantum Cryptography: Impossibility and Constructions},
author = {Harry Buhrman and Nishanth Chandran and Serge Fehr and Ran Gelles and Vipul Goyal and Rafail Ostrovsky and Christian Schaffner},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {423},
doi = {10.1007/978-3-642-22792-9_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23589,
title = {Analyzing Blockwise Lattice Algorithms using Dynamical Systems},
author = {Guillaume Hanrot and Xavier Pujol and Damien Stehl\'e},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {441},
doi = {10.1007/978-3-642-22792-9_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23590,
title = {Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions},
author = {Daniele Micciancio and Petros Mol},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {461},
doi = {10.1007/978-3-642-22792-9_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23591,
title = {Tor and Circumvention: Lessons Learned},
author = {Roger Dingledine},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {481},
doi = {10.1007/978-3-642-22792-9_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23592,
title = {Fully Homomorphic Encryption over the Integers with Shorter Public Keys},
author = {David Naccache and Jean-S\'ebastien Coron and Avradip Mandal and Mehdi Tibouchi},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {483},
doi = {10.1007/978-3-642-22792-9_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23593,
title = {Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages},
author = {Zvika Brakerski and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {501},
doi = {10.1007/978-3-642-22792-9_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23594,
title = {Bi-Deniable Public-Key Encryption},
author = {Adam O'Neill and Chris Peikert and Brent Waters},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {521},
doi = {10.1007/978-3-642-22792-9_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23595,
title = {Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting},
author = {Zvika Brakerski and Gil Segev},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {539},
doi = {10.1007/978-3-642-22792-9_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23596,
title = {The Collision Security of Tandem-DM in the Ideal Cipher Model},
author = {Joojoung Lee and Martijn Stam and John Steinberger},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {557},
doi = {10.1007/978-3-642-22792-9_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23597,
title = {Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions},
author = {Alexandra Boldyreva and Nathan Chenette and Adam O'Neill},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {575},
doi = {10.1007/978-3-642-22792-9_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23598,
title = {A New Variant of PMAC: Beyond the Birthday Bound},
author = {Kan Yasuda},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {593},
doi = {10.1007/978-3-642-22792-9_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23599,
title = {Authenticated and Misuse-Resistant Encryption of Key-Dependent Data},
author = {Mihir Bellare and Sriram Keelveedhi},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {607},
doi = {10.1007/978-3-642-22792-9_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23600,
title = {Round Optimal Blind Signatures in the Standard Model},
author = {Sanjam Garg and Vanishree Rao and Amit Sahai and Dominique Schr\"oder and Dominique Unruh},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {627},
doi = {10.1007/978-3-642-22792-9_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23601,
title = {Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups},
author = {Masayuki Abe and Jens Groth and Kristiyan Haralambiev and Miyako Ohkubo},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {646},
doi = {10.1007/978-3-642-22792-9_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23602,
title = {Constant-Rate Oblivious Transfer from Noisy Channels},
author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and J\"urg Wullschleger},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {664},
doi = {10.1007/978-3-642-22792-9_38},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23603,
title = {The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing},
author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {682},
doi = {10.1007/978-3-642-22792-9_39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23604,
title = {Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials},
author = {Koichi Sakumoto and Taizo Shirai and Harunaga Hiwatari},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {703},
doi = {10.1007/978-3-642-22792-9_40},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23605,
title = {Inverting HFE Systems is Quasi-Polynomial for All Fields},
author = {Jintai Ding and Timothy Hodges},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {721},
doi = {10.1007/978-3-642-22792-9_41},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23606,
title = {Smaller Decoding Exponents: Ball-Collision Decoding},
author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {740},
doi = {10.1007/978-3-642-22792-9_42},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{crypto-2011-23607,
title = {McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks},
author = {Hang Dinh and Cristopher Moore and Alexander Russell},
booktitle = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference},
volume = {6841},
pages = {758},
doi = {10.1007/978-3-642-22792-9_43},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@proceedings{crypto-2011-23720,
title = {Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
author = {Phillip Rogaway},
booktitle = {CRYPTO},
volume = {6841},
url = {http://link.springer.com/book/10.1007/978-3-642-22792-9},
doi = {10.1007/978-3-642-22792-9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23608,
title = {The Arithmetic Codex: Theory and Applications},
author = {Ronald Cramer},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {1},
doi = {10.1007/978-3-642-20465-4_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23609,
title = {Lattice Reduction Algorithms: Theory and Practice},
author = {Phong Q. Nguyen},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {2},
doi = {10.1007/978-3-642-20465-4_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23610,
title = {Efficient Authentication from Hard Learning Problems},
author = {Eike Kiltz and Krzysztof Pietrzak and David Cash and Abhishek Jain and Daniele Venturi},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {7},
doi = {10.1007/978-3-642-20465-4_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23611,
title = {Making NTRU as Secure as Worst-Case Problems over Ideal Lattices},
author = {Damien Stehl\'e and Ron Steinfeld},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {27},
doi = {10.1007/978-3-642-20465-4_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23612,
title = {Faster Explicit Formulas for Computing Pairings over Ordinary Curves},
author = {Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio Lopez},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {48},
doi = {10.1007/978-3-642-20465-4_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23613,
title = {Pushing the Limits: A Very Compact and a Threshold Implementation of AES},
author = {Amir Moradi and Axel Poschmann and San Ling and Christof Paar and Huaxiong Wang},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {69},
doi = {10.1007/978-3-642-20465-4_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23614,
title = {Fully Leakage-Resilient Signatures},
author = {Elette Boyle and Gil Segev and Daniel Wichs},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {89},
doi = {10.1007/978-3-642-20465-4_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23615,
title = {A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices},
author = {Mathieu Renauld and Fran\c cois-Xavier Standaert and Nicolas Veyrat- Charvillon and Dina Kamel and Denis Flandre},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {109},
doi = {10.1007/978-3-642-20465-4_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23616,
title = {Implementing Gentry's Fully-Homomorphic Encryption Scheme},
author = {Craig Gentry and Shai Halevi},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {129},
doi = {10.1007/978-3-642-20465-4_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23617,
title = {Homomorphic Signatures for Polynomial Functions},
author = {Dan Boneh and David Mandell Freeman},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {149},
doi = {10.1007/978-3-642-20465-4_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23618,
title = {Semi-Homomorphic Encryption and Multiparty Computation},
author = {Rikke Bendlin and Ivan Damg\r ard and Claudio Orlandi and Sarah Zakaria},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {169},
doi = {10.1007/978-3-642-20465-4_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23619,
title = {Tight Proofs for Signature Schemes without Random Oracles},
author = {Sven Sch\"age},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {189},
doi = {10.1007/978-3-642-20465-4_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23620,
title = {Adaptive Pseudo-Free Groups and Applications},
author = {Dario Catalano and Dario Fiore and Bogdan Warinschi},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {207},
doi = {10.1007/978-3-642-20465-4_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23621,
title = {Commuting Signatures and Verifiable Encryption},
author = {Georg Fuchsbauer},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {224},
doi = {10.1007/978-3-642-20465-4_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23622,
title = {Secure Authentication from a Weak Key, Without Leaking Information},
author = {Niek J. Bouman and Serge Fehr},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {246},
doi = {10.1007/978-3-642-20465-4_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23623,
title = {Secret Keys from Channel Noise},
author = {Hadi Ahmadi and Reihaneh Safavi-Naini},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {266},
doi = {10.1007/978-3-642-20465-4_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23624,
title = {Almost Optimum t-Cheater Identifiable Secret Sharing Schemes},
author = {Satoshi Obana},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {284},
doi = {10.1007/978-3-642-20465-4_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23625,
title = {On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN},
author = {Gregor Leander},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {303},
doi = {10.1007/978-3-642-20465-4_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23626,
title = {Domain Extension for MACs Beyond the Birthday Barrier},
author = {Yevgeniy Dodis and John Steinberger},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {323},
doi = {10.1007/978-3-642-20465-4_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23627,
title = {Statistical Attack on RC4},
author = {Pouyan Sepehrdad and Serge Vaudenay and Martin Vuagnoux},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {343},
doi = {10.1007/978-3-642-20465-4_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23628,
title = {Improved Generic Algorithms for Hard Knapsacks},
author = {Anja Becker and Jean-S\'ebastien Coron and Antoine Joux},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {364},
doi = {10.1007/978-3-642-20465-4_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23629,
title = {Two-output Secure Computation With Malicious Adversaries},
author = { abhi shelat and Chih-hao Shen},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {386},
doi = {10.1007/978-3-642-20465-4_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23630,
title = {Effcient Non-Interactive Secure Computation},
author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {406},
doi = {10.1007/978-3-642-20465-4_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23631,
title = {Towards a Game Theoretic View of Secure Computation},
author = {Gilad Asharov and Ran Canetti and Carmit Hazay},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {426},
doi = {10.1007/978-3-642-20465-4_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23632,
title = {Highly-Efficient Universally-Composable Commitments based on the DDH Assumption},
author = {Yehuda Lindell},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {446},
doi = {10.1007/978-3-642-20465-4_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23633,
title = {Concurrent composition in the bounded quantum storage model},
author = {Dominique Unruh},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {467},
doi = {10.1007/978-3-642-20465-4_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23634,
title = {Careful with Composition: Limitations of the Indifferentiability Framework},
author = {Thomas Ristenpart and Hovav Shacham and Thomas Shrimpton},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {487},
doi = {10.1007/978-3-642-20465-4_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23635,
title = {Efficient Circuit-Size Independent Public Key Encryption with KDM Security},
author = {Tal Malkin and Isamu Teranishi and Moti Yung},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {507},
doi = {10.1007/978-3-642-20465-4_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23636,
title = {Key-Dependent Message Security: Generic Amplification and Completeness},
author = {Benny Applebaum},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {527},
doi = {10.1007/978-3-642-20465-4_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23637,
title = {Unbounded HIBE and Attribute-Based Encryption},
author = {Allison B. Lewko and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {547},
doi = {10.1007/978-3-642-20465-4_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23638,
title = {Decentralizing Attribute-Based Encryption},
author = {Allison B. Lewko and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {568},
doi = {10.1007/978-3-642-20465-4_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23639,
title = {Threshold and Revocation Cryptosystems via Extractable Hash Proofs},
author = {Hoeteck Wee},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {589},
doi = {10.1007/978-3-642-20465-4_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{eurocrypt-2011-23640,
title = {Deniable Encryption with Negligible Detection Probability: An Interactive Construction},
author = {Markus Durmuth and David Mandell Freeman},
booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6632},
pages = {610},
doi = {10.1007/978-3-642-20465-4_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@proceedings{eurocrypt-2011-23724,
title = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings},
author = {Kenneth G. Paterson},
booktitle = {EUROCRYPT},
volume = {6632},
url = {http://link.springer.com/book/10.1007/978-3-642-20465-4},
doi = {10.1007/978-3-642-20465-4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23552,
title = {Cryptanalysis of the Knapsack Generator},
author = {Simon Knellwolf and Willi Meier},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {188},
doi = {10.1007/978-3-642-21702-9_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23553,
title = {Attack on Broadcast RC4 Revisited},
author = {Subhamoy Maitra and Goutam Paul and Sourav Sen Gupta},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {199},
doi = {10.1007/978-3-642-21702-9_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23554,
title = {Boomerang Attacks on BLAKE-32},
author = {Alex Biryukov and Ivica Nikolic and Arnab Roy},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {218},
doi = {10.1007/978-3-642-21702-9_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23555,
title = {Practical Partial-Collisions on the Compression Function of BMW},
author = {Ga\"etan Leurent and S\oren S. Thomsen},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {238},
doi = {10.1007/978-3-642-21702-9_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23556,
title = {Higher-order differential properties of Keccak and Luffa},
author = {Christina Boura and Anne Canteaut and Christophe De Canni\`ere},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {252},
doi = {10.1007/978-3-642-21702-9_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23557,
title = {Cryptanalysis of PRESENT-like ciphers with secret S-boxes},
author = {Julia Borghoff and Lars Ramkilde Knudsen and Gregor Leander and S\oren S. Thomsen},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {270},
doi = {10.1007/978-3-642-21702-9_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23558,
title = {A Single-Key Attack on the Full GOST Block Cipher},
author = {Takanori Isobe},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {290},
doi = {10.1007/978-3-642-21702-9_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23559,
title = {The Software Performance of Authenticated-Encryption Modes},
author = {Ted Krovetz and Phillip Rogaway},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {306},
doi = {10.1007/978-3-642-21702-9_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23560,
title = {Cryptanalysis of Hummingbird},
author = {Markku-Juhani Olavi Saarinen},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {328},
doi = {10.1007/978-3-642-21702-9_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23561,
title = {The Additive Differential Probability of ARX},
author = {Christophe De Canni\`ere and Nicky Mouha and Bart Preneel and Vesselin Velichkov},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {342},
doi = {10.1007/978-3-642-21702-9_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23562,
title = {Linear Approximations of Addition Modulo $2^n-1$},
author = {Xiutao Feng and Chuankun Wu and Chunfang Zhou},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {359},
doi = {10.1007/978-3-642-21702-9_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23563,
title = {Meet-in-the-Middle Preimage Attacks on Hash Function Modes Instantiating AES},
author = {Yu Sasaki},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {378},
doi = {10.1007/978-3-642-21702-9_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23564,
title = {Known-Key Distinguishers for 11-Round Feistel Ciphers: Application to Collision Attacks on Their Hashing Modes},
author = {Yu Sasaki and Kan Yasuda},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {397},
doi = {10.1007/978-3-642-21702-9_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@proceedings{fse-2011-23728,
title = {Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
author = {Antoine Joux},
booktitle = {FSE},
volume = {6733},
url = {http://link.springer.com/book/10.1007/978-3-642-21702-9},
doi = {10.1007/978-3-642-21702-9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23542,
title = {Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations},
author = {Mohamed Ahmed Abdelraheem and Gregor Leander and Erik Zenner},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {1},
doi = {10.1007/978-3-642-21702-9_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23543,
title = {Search for Related-key Differential Characteristics in DES-like ciphers},
author = {Alex Biryukov and Ivica Nikolic},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {18},
doi = {10.1007/978-3-642-21702-9_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23544,
title = {Multiple Differential Cryptanalysis: Theory and Practice},
author = {C\'eline Blondeau and Beno\^\it G\'erard},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {35},
doi = {10.1007/978-3-642-21702-9_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23545,
title = {Fast Correlation Attacks: Methods and Countermeasures},
author = {Willi Meier},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {55},
doi = {10.1007/978-3-642-21702-9_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23546,
title = {Distinguishers and Free-start Collisions on the Reduced-round SHAvite-3-256 Compression Function},
author = {Marine Minier and Mar\'\ia Naya-Plasencia and Thomas Peyrin},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {68},
doi = {10.1007/978-3-642-21702-9_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23547,
title = {An Improved Algebraic Attack on Hamsi-256},
author = {Itai Dinur and Adi Shamir},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {88},
doi = {10.1007/978-3-642-21702-9_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23548,
title = {Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function},
author = {Pierre-Alain Fouque and Jérémy Jean},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {107},
doi = {10.1007/978-3-642-21702-9_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23549,
title = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model},
author = {Martin Albrecht and Pooya Farshim and Kenny Paterson and Gaven Watson},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {128},
doi = {10.1007/978-3-642-21702-9_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23550,
title = {On the Security of Hash Functions Employing Blockcipher Postprocessing},
author = {Donghoon Chang and Mridul Nandi and Moti Yung},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {146},
doi = {10.1007/978-3-642-21702-9_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{fse-2011-23551,
title = {Breaking Grain-128 with Dynamic Cube Attacks},
author = {Itai Dinur and Adi Shamir},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011},
volume = {6733},
pages = {167},
doi = {10.1007/978-3-642-21702-9_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@article{jofc-2011-24143,
title = {Possibility and Impossibility Results for Selective Decommitments},
author = {Dennis Hofheinz},
journal = {J. Cryptology},
volume = {24},
pages = {470--516},
doi = {10.1007/s00145-010-9066-x},
year = {2011}
}
@article{jofc-2011-24144,
title = {Side-Channel Resistant Crypto for Less than 2, 300 GE},
author = {Axel Poschmann and Amir Moradi and Khoongming Khoo and Chu-Wee Lim and Huaxiong Wang and San Ling},
journal = {J. Cryptology},
volume = {24},
pages = {322--345},
doi = {10.1007/s00145-010-9086-6},
year = {2011}
}
@article{jofc-2011-24145,
title = {Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves},
author = {Steven D. Galbraith and Xibin Lin and Michael Scott},
journal = {J. Cryptology},
volume = {24},
pages = {446--469},
doi = {10.1007/s00145-010-9065-y},
year = {2011}
}
@article{jofc-2011-24146,
title = {Short Undeniable Signatures Based on Group Homomorphisms},
author = {Jean Monnerat and Serge Vaudenay},
journal = {J. Cryptology},
volume = {24},
pages = {545--587},
doi = {10.1007/s00145-010-9070-1},
year = {2011}
}
@article{jofc-2011-24147,
title = {Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer},
author = {Yehuda Lindell and Hila Zarosim},
journal = {J. Cryptology},
volume = {24},
pages = {761--799},
doi = {10.1007/s00145-010-9072-z},
year = {2011}
}
@article{jofc-2011-24148,
title = {Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA},
author = {Gaetan Canivet and Paolo Maistri and R\'egis Leveugle and Jessy Cl\'edi\`ere and Florent Valette and Marc Renaudin},
journal = {J. Cryptology},
volume = {24},
pages = {247--268},
doi = {10.1007/s00145-010-9083-9},
year = {2011}
}
@article{jofc-2011-24149,
title = {Secure Computation Without Authentication},
author = {Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin},
journal = {J. Cryptology},
volume = {24},
pages = {720--760},
doi = {10.1007/s00145-010-9075-9},
year = {2011}
}
@article{jofc-2011-24150,
title = {Guest Editorial},
author = {Christof Paar and Jean-Jacques Quisquater and Berk Sunar},
journal = {J. Cryptology},
volume = {24},
pages = {245--246},
doi = {10.1007/s00145-011-9099-9},
year = {2011}
}
@article{jofc-2011-24151,
title = {Efficient Selective Identity-Based Encryption Without Random Oracles},
author = {Dan Boneh and Xavier Boyen},
journal = {J. Cryptology},
volume = {24},
pages = {659--693},
doi = {10.1007/s00145-010-9078-6},
year = {2011}
}
@article{jofc-2011-24152,
title = {On the Security of Oscillator-Based Random Number Generators},
author = {Mathieu Baudet and David Lubicz and Julien Micolod and Andr\'e Tassiaux},
journal = {J. Cryptology},
volume = {24},
pages = {398--425},
doi = {10.1007/s00145-010-9089-3},
year = {2011}
}
@article{jofc-2011-24153,
title = {Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time},
author = {Martin Hell and Thomas Johansson},
journal = {J. Cryptology},
volume = {24},
pages = {427--445},
doi = {10.1007/s00145-009-9053-2},
year = {2011}
}
@article{jofc-2011-24154,
title = {Tweakable Block Ciphers},
author = {Moses Liskov and Ronald L. Rivest and David Wagner},
journal = {J. Cryptology},
volume = {24},
pages = {588--613},
doi = {10.1007/s00145-010-9073-y},
year = {2011}
}
@article{jofc-2011-24155,
title = {Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs},
author = {Dafna Kidron and Yehuda Lindell},
journal = {J. Cryptology},
volume = {24},
pages = {517--544},
doi = {10.1007/s00145-010-9069-7},
year = {2011}
}
@article{jofc-2011-24156,
title = {Fault-Based Attack on Montgomery's Ladder Algorithm},
author = {Agustin Dominguez-Oviedo and M. Anwar Hasan and Bijan Ansari},
journal = {J. Cryptology},
volume = {24},
pages = {346--374},
doi = {10.1007/s00145-010-9087-5},
year = {2011}
}
@article{jofc-2011-24157,
title = {Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches},
author = {Svetla Nikova and Vincent Rijmen and Martin Schl\"affer},
journal = {J. Cryptology},
volume = {24},
pages = {292--321},
doi = {10.1007/s00145-010-9085-7},
year = {2011}
}
@article{jofc-2011-24158,
title = {Resource Fairness and Composability of Cryptographic Protocols},
author = {Juan A. Garay and Philip D. MacKenzie and Manoj Prabhakaran and Ke Yang},
journal = {J. Cryptology},
volume = {24},
pages = {615--658},
doi = {10.1007/s00145-010-9080-z},
year = {2011}
}
@article{jofc-2011-24159,
title = {Securely Obfuscating Re-Encryption},
author = {Susan Hohenberger and Guy N. Rothblum and Abhi Shelat and Vinod Vaikuntanathan},
journal = {J. Cryptology},
volume = {24},
pages = {694--719},
doi = {10.1007/s00145-010-9077-7},
year = {2011}
}
@article{jofc-2011-24160,
title = {Mutual Information Analysis: a Comprehensive Study},
author = {Lejla Batina and Benedikt Gierlichs and Emmanuel Prouff and Matthieu Rivain and Fran\c cois-Xavier Standaert and Nicolas Veyrat-Charvillon},
journal = {J. Cryptology},
volume = {24},
pages = {269--291},
doi = {10.1007/s00145-010-9084-8},
year = {2011}
}
@article{jofc-2011-24161,
title = {Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive},
author = {Abhranil Maiti and Patrick Schaumont},
journal = {J. Cryptology},
volume = {24},
pages = {375--397},
doi = {10.1007/s00145-010-9088-4},
year = {2011}
}
@article{jofc-2011-23449,
title = {Efficient Non-Malleable Commitment Schemes},
author = {Roger Fischlin and Marc Fischlin},
journal = {J. Cryptology},
volume = {24},
pages = {203--244},
doi = {10.1007/s00145-009-9043-4},
year = {2011}
}
@article{jofc-2011-23450,
title = {An *L*(1/3) Discrete Logarithm Algorithm for Low Degree Curves},
author = {Andreas Enge and Pierrick Gaudry and Emmanuel Thom\'e},
journal = {J. Cryptology},
volume = {24},
pages = {24--41},
doi = {10.1007/s00145-010-9057-y},
year = {2011}
}
@article{jofc-2011-23451,
title = {Practical Collisions for EnRUPT},
author = {Sebastiaan Indesteege and Bart Preneel},
journal = {J. Cryptology},
volume = {24},
pages = {1--23},
doi = {10.1007/s00145-010-9058-x},
year = {2011}
}
@article{jofc-2011-23452,
title = {Wildcarded Identity-Based Encryption},
author = {Michel Abdalla and James Birkett and Dario Catalano and Alexander W. Dent and John Malone-Lee and Gregory Neven and Jacob C. N. Schuldt and Nigel P. Smart},
journal = {J. Cryptology},
volume = {24},
pages = {42--82},
doi = {10.1007/s00145-010-9060-3},
year = {2011}
}
@article{jofc-2011-23453,
title = {Cryptanalysis of the Tillich-Z\'emor Hash Function},
author = {Markus Grassl and Ivana Ilic and Spyros S. Magliveras and Rainer Steinwandt},
journal = {J. Cryptology},
volume = {24},
pages = {148--156},
doi = {10.1007/s00145-010-9063-0},
year = {2011}
}
@article{jofc-2011-23454,
title = {Utility Dependence in Correct and Fair Rational Secret Sharing},
author = {Gilad Asharov and Yehuda Lindell},
journal = {J. Cryptology},
volume = {24},
pages = {157--202},
doi = {10.1007/s00145-010-9064-z},
year = {2011}
}
@article{jofc-2011-23455,
title = {Universally Composable Symbolic Security Analysis},
author = {Ran Canetti and Jonathan Herzog},
journal = {J. Cryptology},
volume = {24},
pages = {83--147},
doi = {10.1007/s00145-009-9055-0},
year = {2011}
}
@inproceedings{pkc-2011-23476,
title = {Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures},
author = {Dan Boneh and David Mandell Freeman},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {1},
doi = {10.1007/978-3-642-19379-8_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23477,
title = {Homomorphic Network Coding Signatures in the Standard Model},
author = {Nuttapong Attrapadung and Beno\^\it Libert},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {17},
doi = {10.1007/978-3-642-19379-8_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23478,
title = {Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model},
author = {Tatsuaki Okamoto and Katsuyuki Takashima},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {35},
doi = {10.1007/978-3-642-19379-8_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23479,
title = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization},
author = {Brent Waters},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {53},
doi = {10.1007/978-3-642-19379-8_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23480,
title = {Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption},
author = {Nuttapong Attrapadung and Goichiro Hanaoka and Noboru Kunihiro and Shota Yamada},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {71},
doi = {10.1007/978-3-642-19379-8_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23481,
title = {Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts},
author = {Nuttapong Attrapadung and Beno\^\it Libert and Elie de Panafieu},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {90},
doi = {10.1007/978-3-642-19379-8_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23482,
title = {Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three},
author = {Roberto Avanzi and Clemens Heuberger},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {109},
doi = {10.1007/978-3-642-19379-8_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23483,
title = {On the correct use of the negation map in the Pollard rho method},
author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {128},
doi = {10.1007/978-3-642-19379-8_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23484,
title = {Cryptanalysis of the RSA Subgroup from TCC 2005},
author = {Jean-S\'ebastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {147},
doi = {10.1007/978-3-642-19379-8_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23485,
title = {(If) Size Matters: Size-Hiding Private Set Intersection},
author = {Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {156},
doi = {10.1007/978-3-642-19379-8_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23486,
title = {Sub-Linear, Secure Comparison With Two Non-Colluding Parties},
author = {Tomas Toft},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {174},
doi = {10.1007/978-3-642-19379-8_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23487,
title = {Oblivious Transfer with Hidden Access Control Lists},
author = {Jan Camenisch and Maria Dubovitskaya and Gregory Neven and Gregory Zaverucha},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {192},
doi = {10.1007/978-3-642-19379-8_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@proceedings{pkc-2011-23743,
title = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings},
author = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi},
booktitle = {PKC},
volume = {6571},
url = {http://link.springer.com/book/10.1007/978-3-642-19379-8},
doi = {10.1007/978-3-642-19379-8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23488,
title = {Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited},
author = {Dingding Jia and Bao Li and Xianhui Lu and Qixiang Mei},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {210},
doi = {10.1007/978-3-642-19379-8_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23489,
title = {Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security},
author = {Robert H. Deng and Junzuo Lai and Shengli Liu},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {228},
doi = {10.1007/978-3-642-19379-8_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23490,
title = {Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks},
author = {Takahiro Matsuda and Kanta Matsuura},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {246},
doi = {10.1007/978-3-642-19379-8_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23491,
title = {Secure Blind Decryption},
author = {Matthew Green},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {265},
doi = {10.1007/978-3-642-19379-8_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23492,
title = {New Developments in Leakage-Resilient Cryptography},
author = {Vinod Vaikuntanathan},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {283},
doi = {10.1007/978-3-642-19379-8_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23493,
title = {Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants},
author = {Luk Bettale and Jean-Charles Faug\`ere and Ludovic Perret},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {441},
doi = {10.1007/978-3-642-19379-8_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23494,
title = {Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials},
author = {Vivien Dubois and Jean-Gabriel Kammerer},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {459},
doi = {10.1007/978-3-642-19379-8_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23495,
title = {Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem},
author = {Charles Bouillaguet and Jean-Charles Faug\`ere and Pierre-Alain Fouque and Ludovic Perret},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {473},
doi = {10.1007/978-3-642-19379-8_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23496,
title = {Linear Recurring Sequences for the UOV Key Generation},
author = {Johannes Buchmann and Stanislav Bulygin and Albrecht Petzoldt},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {335},
doi = {10.1007/978-3-642-19379-8_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23497,
title = {On the Impossibility of Instantiating PSS in the Standard Model},
author = {Rishiraj Bhattacharyya and Avradip Mandal},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {351},
doi = {10.1007/978-3-642-19379-8_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23498,
title = {On-line Non-transferable Signatures Revisited},
author = {Kanta Matsuura and Jacob C.N. Schuldt},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {369},
doi = {10.1007/978-3-642-19379-8_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23499,
title = {Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra},
author = {Jae Hong Seo},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {387},
doi = {10.1007/978-3-642-19379-8_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23500,
title = {Signatures on Randomizable Ciphertexts},
author = {Olivier Blazy and Georg Fuchsbauer and David Pointcheval and Damien Vergnaud},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {403},
doi = {10.1007/978-3-642-19379-8_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23501,
title = {Revocation for Delegatable Anonymous Credentials},
author = {Tolga Acar and Lan Nguyen},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {423},
doi = {10.1007/978-3-642-19379-8_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23502,
title = {On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010},
author = {Goichiro Hanaoka and Jian Weng and Yunlei Zhao},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {284},
doi = {10.1007/978-3-642-19379-8_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23503,
title = {Fully Secure Accountable-Authority Identity-Based Encryption},
author = {Amit Sahai and Hakan Seyalioglu},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {296},
doi = {10.1007/978-3-642-19379-8_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{pkc-2011-23504,
title = {One-Pass HMQV and Asymmetric Key-Wrapping},
author = {Shai Halevi and Hugo Krawczyk},
booktitle = {Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography},
volume = {6571},
pages = {317},
doi = {10.1007/978-3-642-19379-8_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@proceedings{tcc-2011-23745,
title = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
author = {Yuval Ishai},
booktitle = {TCC},
volume = {6597},
url = {http://link.springer.com/book/10.1007/978-3-642-19571-6},
doi = {10.1007/978-3-642-19571-6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23505,
title = {Input Locality and Hardness Amplification},
author = {Andrej Bogdanov and Alon Rosen},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {1},
doi = {10.1007/978-3-642-19571-6_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23506,
title = {General Hardness Amplification of Predicates and Puzzles},
author = {Thomas Holenstein and Grant Schoenebeck},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {19},
doi = {10.1007/978-3-642-19571-6_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23507,
title = {Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma},
author = {Stefano Tessaro},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {37},
doi = {10.1007/978-3-642-19571-6_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23508,
title = {Dense Model Theorems and Their Applications},
author = {Luca Trevisan},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {55},
doi = {10.1007/978-3-642-19571-6_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23509,
title = {Parallel Repetition for Leakage Resilience Amplification Revisited},
author = {Abhishek Jain and Krzysztof Pietrzak},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {58},
doi = {10.1007/978-3-642-19571-6_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23510,
title = {Achieving Leakage Resilience Through Dual System Encryption},
author = {Allison B. Lewko and Yannis Rouselakis and Brent Waters},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {70},
doi = {10.1007/978-3-642-19571-6_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23511,
title = {Signatures Resilient to Continual Leakage on Memory and Computation},
author = {Tal Malkin and Isamu Teranishi and Yevgeniy Vahlis and Moti Yung},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {89},
doi = {10.1007/978-3-642-19571-6_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23512,
title = {After-the-Fact Leakage in Public-Key Encryption},
author = {Shai Halevi and Huijia Lin},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {107},
doi = {10.1007/978-3-642-19571-6_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23513,
title = {One-Time Computable Self-Erasing Functions},
author = {Stefan Dziembowski and Tomasz Kazana and Daniel Wichs},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {125},
doi = {10.1007/978-3-642-19571-6_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23514,
title = {Perfectly Secure Oblivious RAM Without Random Oracles},
author = {Ivan Damg\r ard and Sigurd Meldgaard and Jesper Buus Nielsen},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {144},
doi = {10.1007/978-3-642-19571-6_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23515,
title = {Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token},
author = {Nico D\"ottling and Daniel Kraschewski and J\"orn M\"uller-Quade},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {164},
doi = {10.1007/978-3-642-19571-6_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23516,
title = {Correlated-Input Secure Hash Functions},
author = {Vipul Goyal and Adam O'Neill and Vanishree Rao},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {182},
doi = {10.1007/978-3-642-19571-6_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23517,
title = {Black-Box Circular-Secure Encryption Beyond Affine Functions},
author = {Zvika Brakerski and Shafi Goldwasser and Yael Tauman Kalai},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {201},
doi = {10.1007/978-3-642-19571-6_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23518,
title = {Homomorphic Encryption: from Private-Key to Public-Key},
author = {Ron D. Rothblum},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {219},
doi = {10.1007/978-3-642-19571-6_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23519,
title = {Identity-Based Encryption Secure Against Selective Opening Attack},
author = {Mihir Bellare and Brent Waters and Scott Yilek},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {235},
doi = {10.1007/978-3-642-19571-6_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23520,
title = {Functional Encryption: Definitions and Challenges},
author = {Dan Boneh and Amit Sahai and Brent Waters},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {253},
doi = {10.1007/978-3-642-19571-6_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23521,
title = {Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs},
author = {Huijia Lin and Rafael Pass},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {274},
doi = {10.1007/978-3-642-19571-6_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23522,
title = {Round-Optimal Password-Based Authenticated Key Exchange},
author = {Jonathan Katz and Vinod Vaikuntanathan},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {293},
doi = {10.1007/978-3-642-19571-6_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23523,
title = {Bringing People of Different Beliefs Together to do UC},
author = {Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {311},
doi = {10.1007/978-3-642-19571-6_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23524,
title = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer},
author = {Yehuda Lindell and Benny Pinkas},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {329},
doi = {10.1007/978-3-642-19571-6_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23525,
title = {Practical Adaptive Oblivious Transfer from Simple Assumptions},
author = {Matthew Green and Susan Hohenberger},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {347},
doi = {10.1007/978-3-642-19571-6_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23526,
title = {Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions},
author = {Daniel Kraschewski and J\"orn M\"uller-Quade},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {364},
doi = {10.1007/978-3-642-19571-6_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23527,
title = {A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs},
author = {Gunnar Kreitz},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {382},
doi = {10.1007/978-3-642-19571-6_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23528,
title = {PCPs and the Hardness of Generating Private Synthetic Data},
author = {Jonathan Ullman and Salil P. Vadhan},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {400},
doi = {10.1007/978-3-642-19571-6_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23529,
title = {Limits of Computational Differential Privacy in the Client/Server Setting},
author = {Adam Groce and Jonathan Katz and Arkady Yerukhimovich},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {417},
doi = {10.1007/978-3-642-19571-6_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23530,
title = {Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy},
author = {Johannes Gehrke and Edward Lui and Rafael Pass},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {432},
doi = {10.1007/978-3-642-19571-6_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23531,
title = {On the Black-Box Complexity of Optimally-Fair Coin Tossing},
author = {Dana Dachman-Soled and Yehuda Lindell and Mohammad Mahmoody and Tal Malkin},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {450},
doi = {10.1007/978-3-642-19571-6_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23532,
title = {Tight Bounds for Classical and Quantum Coin Flipping},
author = {Esther H\"anggi and J\"urg Wullschleger},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {468},
doi = {10.1007/978-3-642-19571-6_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23533,
title = {Exploring the Limits of Common Coins Using Frontier Analysis of Protocols},
author = {Hemanta K. Maji and Pichayoot Ouppaphan and Manoj Prabhakaran and Mike Rosulek},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {486},
doi = {10.1007/978-3-642-19571-6_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23534,
title = {Limits on the Stretch of Non-Adaptive Constructions of Pseudo-Random Generators},
author = {Josh Bronson and Ali Juma and Periklis A. Papakonstantinou},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {504},
doi = {10.1007/978-3-642-19571-6_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23535,
title = {On the Complexity of Non-Adaptively Increasing the Stretch of Pseudorandom Generators},
author = {Eric Miles and Emanuele Viola},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {522},
doi = {10.1007/978-3-642-19571-6_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23536,
title = {Concurrent Security and Non-malleability},
author = {Rafael Pass},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {540},
doi = {10.1007/978-3-642-19571-6_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23537,
title = {(Nearly) Round-Optimal Black-Box Constructions of Commitments Secure Against Selective Opening Attacks},
author = {David Xiao},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {541},
doi = {10.1007/978-3-642-19571-6_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23538,
title = {Limits On The Power of Zero-Knowledge Proofs in Cryptographic Constructions},
author = {Zvika Brakerski and Jonathan Katz and Gil Segev and Arkady Yerukhimovich},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {559},
doi = {10.1007/978-3-642-19571-6_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23539,
title = {Towards Non-Black-Box Lower Bounds in Cryptography},
author = {Rafael Pass and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {579},
doi = {10.1007/978-3-642-19571-6_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23540,
title = {On Black-Box Separations among Injective One-Way Functions},
author = {Takahiro Matsuda and Kanta Matsuura},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {597},
doi = {10.1007/978-3-642-19571-6_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{tcc-2011-23541,
title = {Impossibility of Blind Signatures From One-Way Permutations},
author = {Jonathan Katz and Dominique Schr\"oder and Arkady Yerukhimovich},
booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011},
volume = {6597},
pages = {615},
doi = {10.1007/978-3-642-19571-6_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011}
}
@inproceedings{asiacrypt-2010-23817,
title = {The Degree of Regularity of HFE Systems},
author = {Vivien Dubois and Nicolas Gama},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {557--576},
doi = {10.1007/978-3-642-17373-8_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23818,
title = {The Round Complexity of Verifiable Secret Sharing: The Statistical Case},
author = {Ranjit Kumaresan and Arpita Patra and C. Pandu Rangan},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {431--447},
doi = {10.1007/978-3-642-17373-8_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23819,
title = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2},
author = {Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {56--75},
doi = {10.1007/978-3-642-17373-8_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23820,
title = {General Perfectly Secure Message Transmission Using Linear Codes},
author = {Qiushi Yang and Yvo Desmedt},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {448--465},
doi = {10.1007/978-3-642-17373-8_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23821,
title = {Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model},
author = {Emiliano De Cristofaro and Jihye Kim and Gene Tsudik},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {213--231},
doi = {10.1007/978-3-642-17373-8_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23822,
title = {A Group Signature Scheme from Lattice Assumptions},
author = {S. Dov Gordon and Jonathan Katz and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {395--412},
doi = {10.1007/978-3-642-17373-8_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23823,
title = {On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields},
author = {Robert Granger},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {283--302},
doi = {10.1007/978-3-642-17373-8_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23824,
title = {Faster Fully Homomorphic Encryption},
author = {Damien Stehl\'e and Ron Steinfeld},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {377--394},
doi = {10.1007/978-3-642-17373-8_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23825,
title = {Generic Compilers for Authenticated Key Exchange},
author = {Tibor Jager and Florian Kohlar and Sven Sch\"age and J\"org Schwenk},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {232--249},
doi = {10.1007/978-3-642-17373-8_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23826,
title = {On Invertible Sampling and Adaptive Security},
author = {Yuval Ishai and Abishek Kumarasubramanian and Claudio Orlandi and Amit Sahai},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {466--482},
doi = {10.1007/978-3-642-17373-8_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23827,
title = {The Semi-Generic Group Model and Applications to Pairing-Based Cryptography},
author = {Tibor Jager and Andy Rupp},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {539--556},
doi = {10.1007/978-3-642-17373-8_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23828,
title = {Rotational Rebound Attacks on Reduced Skein},
author = {Dmitry Khovratovich and Ivica Nikolic and Christian Rechberger},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {1--19},
doi = {10.1007/978-3-642-17373-8_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23829,
title = {Efficient String-Commitment from Weak Bit-Commitment},
author = {Kai-Min Chung and Feng-Hao Liu and Chi-Jen Lu and Bo-Yin Yang},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {268--282},
doi = {10.1007/978-3-642-17373-8_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23830,
title = {Computationally Secure Pattern Matching in the Presence of Malicious Adversaries},
author = {Carmit Hazay and Tomas Toft},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {195--212},
doi = {10.1007/978-3-642-17373-8_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23831,
title = {Non-full-active Super-Sbox Analysis: Applications to ECHO and Gr\ostl},
author = {Yu Sasaki and Yang Li and Lei Wang and Kazuo Sakiyama and Kazuo Ohta},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {38--55},
doi = {10.1007/978-3-642-17373-8_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23832,
title = {Collision Attacks against the Knudsen-Preneel Compression Functions},
author = {Onur \"Ozen and Martijn Stam},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {76--93},
doi = {10.1007/978-3-642-17373-8_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23833,
title = {Optimistic Concurrent Zero Knowledge},
author = {Alon Rosen and Abhi Shelat},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {359--376},
doi = {10.1007/978-3-642-17373-8_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23834,
title = {Improved Single-Key Attacks on 8-Round AES-192 and AES-256},
author = {Orr Dunkelman and Nathan Keller and Adi Shamir},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {158--176},
doi = {10.1007/978-3-642-17373-8_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23835,
title = {The World Is Not Enough: Another Look on Second-Order DPA},
author = {Fran\c cois-Xavier Standaert and Nicolas Veyrat-Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {112--129},
doi = {10.1007/978-3-642-17373-8_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23836,
title = {Efficient Public-Key Cryptography in the Presence of Key Leakage},
author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana L\'opez-Alt and Daniel Wichs},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {613--631},
doi = {10.1007/978-3-642-17373-8_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23837,
title = {Leakage Resilient ElGamal Encryption},
author = {Eike Kiltz and Krzysztof Pietrzak},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {595--612},
doi = {10.1007/978-3-642-17373-8_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23838,
title = {Finding Second Preimages of Short Messages for Hamsi-256},
author = {Thomas Fuhr},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {20--37},
doi = {10.1007/978-3-642-17373-8_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23839,
title = {Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition},
author = {Chao Ning and Qiuliang Xu},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {483--500},
doi = {10.1007/978-3-642-17373-8_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23840,
title = {A Closer Look at Anonymity and Robustness in Encryption Schemes},
author = {Payman Mohassel},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {501--518},
doi = {10.1007/978-3-642-17373-8_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23841,
title = {Short Non-interactive Zero-Knowledge Proofs},
author = {Jens Groth},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {341--358},
doi = {10.1007/978-3-642-17373-8_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23842,
title = {Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions},
author = {Emmanuel Volte and Val\'erie Nachef and Jacques Patarin},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {94--111},
doi = {10.1007/978-3-642-17373-8_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23843,
title = {Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems},
author = {Simon Knellwolf and Willi Meier and Mar\'\ia Naya-Plasencia},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {130--145},
doi = {10.1007/978-3-642-17373-8_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23844,
title = {A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT},
author = {Eric Brier and Thomas Peyrin},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {250--267},
doi = {10.1007/978-3-642-17373-8_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23845,
title = {Structured Encryption and Controlled Disclosure},
author = {Melissa Chase and Seny Kamara},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {577--594},
doi = {10.1007/978-3-642-17373-8_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23846,
title = {Constant-Size Commitments to Polynomials and Their Applications},
author = {Aniket Kate and Gregory M. Zaverucha and Ian Goldberg},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {177--194},
doi = {10.1007/978-3-642-17373-8_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23847,
title = {A Byte-Based Guess and Determine Attack on SOSEMANUK},
author = {Xiutao Feng and Jun Liu and Zhaocun Zhou and Chuankun Wu and Dengguo Feng},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {146--157},
doi = {10.1007/978-3-642-17373-8_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23848,
title = {Lattice-Based Blind Signatures},
author = {Markus R\"uckert},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {413--430},
doi = {10.1007/978-3-642-17373-8_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23849,
title = {Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures},
author = {Sarah Meiklejohn and Hovav Shacham and David Mandell Freeman},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {519--538},
doi = {10.1007/978-3-642-17373-8_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23850,
title = {Random Oracles with(out) Programmability},
author = {Marc Fischlin and Anja Lehmann and Thomas Ristenpart and Thomas Shrimpton and Martijn Stam and Stefano Tessaro},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {303--320},
doi = {10.1007/978-3-642-17373-8_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{asiacrypt-2010-23851,
title = {Short Pairing-Based Non-interactive Zero-Knowledge Arguments},
author = {Jens Groth},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
pages = {321--340},
doi = {10.1007/978-3-642-17373-8_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@proceedings{asiacrypt-2010-23714,
title = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings},
author = {Masayuki Abe},
booktitle = {Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {6477},
url = {http://link.springer.com/book/10.1007/978-3-642-17373-8},
doi = {10.1007/978-3-642-17373-8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23961,
title = {The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes},
author = {Daisuke Suzuki and Koichi Shimizu},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {366--382},
doi = {10.1007/978-3-642-15031-9_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23962,
title = {An Alternative to Error Correction for SRAM-Like PUFs},
author = {Maximilian Hofer and Christoph Boehm},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {335--350},
doi = {10.1007/978-3-642-15031-9_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23963,
title = {Quark: A Lightweight Hash},
author = {Jean-Philippe Aumasson and Luca Henzen and Willi Meier and Mar\'\ia Naya-Plasencia},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {1--15},
doi = {10.1007/978-3-642-15031-9_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23964,
title = {PRINTcipher: A Block Cipher for IC-Printing},
author = {Lars R. Knudsen and Gregor Leander and Axel Poschmann and Matthew J. B. Robshaw},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {16--32},
doi = {10.1007/978-3-642-15031-9_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23965,
title = {Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection},
author = {Dongdong Du and Seetharam Narasimhan and Rajat Subhra Chakraborty and Swarup Bhunia},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {173--187},
doi = {10.1007/978-3-642-15031-9_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23966,
title = {Co-*Z* Addition Formul\ae and Binary Ladders on Elliptic Curves - (Extended Abstract)},
author = {Raveen R. Goundar and Marc Joye and Atsuko Miyaji},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {65--79},
doi = {10.1007/978-3-642-15031-9_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23967,
title = {Coordinate Blinding over Large Prime Fields},
author = {Michael Tunstall and Marc Joye},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {443--455},
doi = {10.1007/978-3-642-15031-9_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23968,
title = {Provably Secure Higher-Order Masking of AES},
author = {Matthieu Rivain and Emmanuel Prouff},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {413--427},
doi = {10.1007/978-3-642-15031-9_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23969,
title = {ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware},
author = {St\'ephane Badel and Nilay Dagtekin and Jorge Nakahara and Khaled Ouafi and Nicolas Reff\'e and Pouyan Sepehrdad and Petr Susil and Serge Vaudenay},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {398--412},
doi = {10.1007/978-3-642-15031-9_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23970,
title = {Public Key Perturbation of Randomized RSA Implementations},
author = {Alexandre Berzati and C\'ecile Canovas-Dumas and Louis Goubin},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {306--319},
doi = {10.1007/978-3-642-15031-9_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23971,
title = "Mixed Bases for Efficient Inversion in $F((2^2)^2)^2$ and Conversion Matrices of SubBytes of {AES}",
author = {Yasuyuki Nogami and Kenta Nekado and Tetsumi Toyota and Naoto Hongo and Yoshitaka Morikawa},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {234--247},
doi = {10.1007/978-3-642-15031-9_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@proceedings{ches-2010-23716,
title = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
author = {Stefan Mangard and Fran\c cois-Xavier Standaert},
booktitle = {CHES},
volume = {6225},
doi = {10.1007/978-3-642-15031-9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23972,
title = {Efficient Techniques for High-Speed Elliptic Curve Cryptography},
author = {Patrick Longa and Catherine H. Gebotys},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {80--94},
doi = {10.1007/978-3-642-15031-9_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23973,
title = {Correlation-Enhanced Power Analysis Collision Attack},
author = {Amir Moradi and Oliver Mischke and Thomas Eisenbarth},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {125--139},
doi = {10.1007/978-3-642-15031-9_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23974,
title = {256 Bit Standardized Crypto for 650 GE - GOST Revisited},
author = {Axel Poschmann and San Ling and Huaxiong Wang},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {219--233},
doi = {10.1007/978-3-642-15031-9_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23975,
title = {New High Entropy Element for FPGA Based True Random Number Generators},
author = {Michal Varchola and Milos Drutarovsky},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {351--365},
doi = {10.1007/978-3-642-15031-9_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23976,
title = {Sponge-Based Pseudo-Random Number Generators},
author = {Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {33--47},
doi = {10.1007/978-3-642-15031-9_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23977,
title = {When Failure Analysis Meets Side-Channel Attacks},
author = {Jerome Di-Battista and Jean-Christophe Courr\`ege and Bruno Rouzeyre and Lionel Torres and Philippe Perdu},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {188--202},
doi = {10.1007/978-3-642-15031-9_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23978,
title = {Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures},
author = {Joppe W. Bos and Deian Stefan},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {279--293},
doi = {10.1007/978-3-642-15031-9_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23979,
title = {Analysis and Improvement of the Random Delay Countermeasure of CHES 2009},
author = {Jean-S\'ebastien Coron and Ilya Kizhvatov},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {95--109},
doi = {10.1007/978-3-642-15031-9_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23980,
title = {A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over $F_p$},
author = {Nicolas Guillermin},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {48--64},
doi = {10.1007/978-3-642-15031-9_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23981,
title = {Side-Channel Analysis of Six SHA-3 Candidates},
author = {Olivier Beno\^\it and Thomas Peyrin},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {140--157},
doi = {10.1007/978-3-642-15031-9_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23982,
title = {New Results on Instruction Cache Attacks},
author = {Onur Acii\c cmez and Billy Bob Brumley and Philipp Grabher},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {110--124},
doi = {10.1007/978-3-642-15031-9_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23983,
title = {Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs},
author = {Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {264--278},
doi = {10.1007/978-3-642-15031-9_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23984,
title = {Developing a Hardware Evaluation Method for SHA-3 Candidates},
author = {Luca Henzen and Pietro Gendotti and Patrice Guillet and Enrico Pargaetzi and Martin Zoller and Frank K. G\"urkaynak},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {248--263},
doi = {10.1007/978-3-642-15031-9_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23985,
title = {Algebraic Side-Channel Analysis in the Presence of Errors},
author = {Yossef Oren and Mario Kirschbaum and Thomas Popp and Avishai Wool},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {428--442},
doi = {10.1007/978-3-642-15031-9_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23986,
title = {XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework},
author = {Christian Wenzel-Benner and Jens Gr\"af},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {294--305},
doi = {10.1007/978-3-642-15031-9_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23987,
title = {Fault Sensitivity Analysis},
author = {Yang Li and Kazuo Sakiyama and Shigeto Gomisawa and Toshinori Fukunaga and Junko Takahashi and Kazuo Ohta},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {320--334},
doi = {10.1007/978-3-642-15031-9_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23988,
title = {Flash Memory 'Bumping' Attacks},
author = {Sergei Skorobogatov},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {158--172},
doi = {10.1007/978-3-642-15031-9_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23989,
title = {Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)},
author = {Kimmo J\"arvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {383--397},
doi = {10.1007/978-3-642-15031-9_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{ches-2010-23990,
title = {Fast Exhaustive Search for Polynomial Systems in *F*_{2}},
author = {Charles Bouillaguet and Hsieh-Chung Chen and Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Adi Shamir and Bo-Yin Yang},
booktitle = {Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop},
volume = {6225},
pages = {203--218},
doi = {10.1007/978-3-642-15031-9_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23859,
title = {Efficient Chosen-Ciphertext Security via Extractable Hash Proofs},
author = {Hoeteck Wee},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {314--332},
doi = {10.1007/978-3-642-14623-7_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23923,
title = {On Generalized Feistel Networks},
author = {Viet Tung Hoang and Phillip Rogaway},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {613--630},
doi = {10.1007/978-3-642-14623-7_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23924,
title = {On Strong Simulation and Composable Point Obfuscation},
author = {Nir Bitansky and Ran Canetti},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {520--537},
doi = {10.1007/978-3-642-14623-7_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23925,
title = {Oblivious RAM Revisited},
author = {Benny Pinkas and Tzachy Reinman},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {502--519},
doi = {10.1007/978-3-642-14623-7_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23926,
title = {*i*-Hop Homomorphic Encryption and Rerandomizable Yao Circuits},
author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {155--172},
doi = {10.1007/978-3-642-14623-7_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23927,
title = {Protecting Cryptographic Keys against Continual Leakage},
author = {Ali Juma and Yevgeniy Vahlis},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {41--58},
doi = {10.1007/978-3-642-14623-7_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23928,
title = {Factorization of a 768-Bit RSA Modulus},
author = {Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen K. Lenstra and Emmanuel Thom\'e and Joppe W. Bos and Pierrick Gaudry and Alexander Kruppa and Peter L. Montgomery and Dag Arne Osvik and Herman J. J. te Riele and Andrey Timofeev and Paul Zimmermann},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {333--350},
doi = {10.1007/978-3-642-14623-7_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23929,
title = {Universally Composable Incoercibility},
author = {Dominique Unruh and J\"orn M\"uller-Quade},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {411--428},
doi = {10.1007/978-3-642-14623-7_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23930,
title = {Structure-Preserving Signatures and Commitments to Group Elements},
author = {Masayuki Abe and Georg Fuchsbauer and Jens Groth and Kristiyan Haralambiev and Miyako Ohkubo},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {209--236},
doi = {10.1007/978-3-642-14623-7_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23931,
title = {Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness},
author = {Craig Gentry},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {116--137},
doi = {10.1007/978-3-642-14623-7_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23932,
title = {Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost},
author = {Ivan Damg\r ard and Claudio Orlandi},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {558--576},
doi = {10.1007/978-3-642-14623-7_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23933,
title = {Cryptographic Extraction and Key Derivation: The HKDF Scheme},
author = {Hugo Krawczyk},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {631--648},
doi = {10.1007/978-3-642-14623-7_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23934,
title = {Time Space Tradeoffs for Attacks against One-Way Functions and PRGs},
author = {Anindya De and Luca Trevisan and Madhur Tulsiani},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {649--665},
doi = {10.1007/978-3-642-14623-7_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23935,
title = {Securing Computation against Continuous Leakage},
author = {Shafi Goldwasser and Guy N. Rothblum},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {59--79},
doi = {10.1007/978-3-642-14623-7_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23936,
title = {Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks},
author = {Mihir Bellare and David Cash},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {666--684},
doi = {10.1007/978-3-642-14623-7_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23937,
title = {Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks},
author = {Yevgeniy Dodis and Krzysztof Pietrzak},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {21--40},
doi = {10.1007/978-3-642-14623-7_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23938,
title = {Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption},
author = {Tatsuaki Okamoto and Katsuyuki Takashima},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {191--208},
doi = {10.1007/978-3-642-14623-7_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23939,
title = {Concurrent Non-Malleable Zero Knowledge Proofs},
author = {Huijia Lin and Rafael Pass and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {429--446},
doi = {10.1007/978-3-642-14623-7_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23940,
title = {Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers},
author = {Rosario Gennaro and Craig Gentry and Bryan Parno},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {465--482},
doi = {10.1007/978-3-642-14623-7_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23941,
title = {A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony},
author = {Orr Dunkelman and Nathan Keller and Adi Shamir},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {393--410},
doi = {10.1007/978-3-642-14623-7_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23942,
title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography},
author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {173--190},
doi = {10.1007/978-3-642-14623-7_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23943,
title = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE},
author = {Shweta Agrawal and Dan Boneh and Xavier Boyen},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {98--115},
doi = {10.1007/978-3-642-14623-7_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23944,
title = {Equivalence of Uniform Key Agreement and Composition Insecurity},
author = {Chongwon Cho and Chen-Kuei Lee and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {447--464},
doi = {10.1007/978-3-642-14623-7_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23945,
title = {Protocols for Multiparty Coin Toss with Dishonest Majority},
author = {Amos Beimel and Eran Omri and Ilan Orlov},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {538--557},
doi = {10.1007/978-3-642-14623-7_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23946,
title = {An Efficient and Parallel Gaussian Sampler for Lattices},
author = {Chris Peikert},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {80--97},
doi = {10.1007/978-3-642-14623-7_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23947,
title = {A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security},
author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {595--612},
doi = {10.1007/978-3-642-14623-7_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23948,
title = {Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries},
author = {Fr\'ed\'eric Dupuis and Jesper Buus Nielsen and Louis Salvail},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {685--706},
doi = {10.1007/978-3-642-14623-7_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23949,
title = {Credential Authenticated Identification and Key Exchange},
author = {Jan Camenisch and Nathalie Casati and Thomas Gro\ss and Victor Shoup},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {255--276},
doi = {10.1007/978-3-642-14623-7_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23950,
title = {Secure Multiparty Computation with Minimal Interaction},
author = {Yuval Ishai and Eyal Kushilevitz and Anat Paskin},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {577--594},
doi = {10.1007/978-3-642-14623-7_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23951,
title = {Correcting Errors in RSA Private Keys},
author = {Wilko Henecka and Alexander May and Alexander Meurer},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {351--369},
doi = {10.1007/978-3-642-14623-7_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23952,
title = {Improved Differential Attacks for ECHO and Gr\ostl},
author = {Thomas Peyrin},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {370--392},
doi = {10.1007/978-3-642-14623-7_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23953,
title = {Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back)},
author = {Zvika Brakerski and Shafi Goldwasser},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {1--20},
doi = {10.1007/978-3-642-14623-7_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23954,
title = {Additively Homomorphic Encryption with *d*-Operand Multiplications},
author = {Carlos Aguilar Melchor and Philippe Gaborit and Javier Herranz},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {138--154},
doi = {10.1007/978-3-642-14623-7_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23955,
title = {On the Efficiency of Classical and Quantum Oblivious Transfer Reductions},
author = {Severin Winkler and J\"urg Wullschleger},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {707--723},
doi = {10.1007/978-3-642-14623-7_38},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23956,
title = {Instantiability of RSA-OAEP under Chosen-Plaintext Attack},
author = {Eike Kiltz and Adam O'Neill and Adam Smith},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {295--313},
doi = {10.1007/978-3-642-14623-7_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23957,
title = {Efficient Indifferentiable Hashing into Ordinary Elliptic Curves},
author = {Eric Brier and Jean-S\'ebastien Coron and Thomas Icart and David Madore and Hugues Randriam and Mehdi Tibouchi},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {237--254},
doi = {10.1007/978-3-642-14623-7_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23958,
title = {Sampling in a Quantum Population, and Applications},
author = {Niek J. Bouman and Serge Fehr},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {724--741},
doi = {10.1007/978-3-642-14623-7_39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23959,
title = {Password-Authenticated Session-Key Generation on the Internet in the Plain Model},
author = {Vipul Goyal and Abhishek Jain and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {277--294},
doi = {10.1007/978-3-642-14623-7_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{crypto-2010-23960,
title = {Improved Delegation of Computation Using Fully Homomorphic Encryption},
author = {Kai-Min Chung and Yael Tauman Kalai and Salil P. Vadhan},
booktitle = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference},
volume = {6223},
pages = {483--501},
doi = {10.1007/978-3-642-14623-7_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@proceedings{crypto-2010-23718,
title = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
author = {Tal Rabin},
booktitle = {CRYPTO},
volume = {6223},
url = {http://link.springer.com/book/10.1007/978-3-642-14623-7},
doi = {10.1007/978-3-642-14623-7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@proceedings{eurocrypt-2010-23723,
title = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings},
author = {Henri Gilbert},
booktitle = {EUROCRYPT},
volume = {6110},
url = {http://link.springer.com/book/10.1007/978-3-642-13190-5},
doi = {10.1007/978-3-642-13190-5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-23991,
title = {A Simple BGN-Type Cryptosystem from LWE},
author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {506--522},
doi = {10.1007/978-3-642-13190-5_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-23992,
title = {On the Impossibility of Three-Move Blind Signature Schemes},
author = {Marc Fischlin and Dominique Schr\"oder},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {197--215},
doi = {10.1007/978-3-642-13190-5_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-23993,
title = {Bonsai Trees, or How to Delegate a Lattice Basis},
author = {David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {523--552},
doi = {10.1007/978-3-642-13190-5_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-23994,
title = {Algebraic Cryptanalysis of McEliece Variants with Compact Keys},
author = {Jean-Charles Faug\`ere and Ayoub Otmani and Ludovic Perret and Jean-Pierre Tillich},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {279--298},
doi = {10.1007/978-3-642-13190-5_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-23995,
title = {Lattice Enumeration Using Extreme Pruning},
author = {Nicolas Gama and Phong Q. Nguyen and Oded Regev},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {257--278},
doi = {10.1007/978-3-642-13190-5_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-23996,
title = {Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases},
author = {Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {135--156},
doi = {10.1007/978-3-642-13190-5_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-23997,
title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption},
author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {62--91},
doi = {10.1007/978-3-642-13190-5_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-23998,
title = {Stam's Collision Resistance Conjecture},
author = {John P. Steinberger},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {597--615},
doi = {10.1007/978-3-642-13190-5_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-23999,
title = {Secure Obfuscation for Encrypted Signatures},
author = {Satoshi Hada},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {92--112},
doi = {10.1007/978-3-642-13190-5_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24000,
title = {On Ideal Lattices and Learning with Errors over Rings},
author = {Vadim Lyubashevsky and Chris Peikert and Oded Regev},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {1--23},
doi = {10.1007/978-3-642-13190-5_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24001,
title = {Universally Composable Quantum Multi-party Computation},
author = {Dominique Unruh},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {486--505},
doi = {10.1007/978-3-642-13190-5_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24002,
title = {Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups},
author = {David Mandell Freeman},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {44--61},
doi = {10.1007/978-3-642-13190-5_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24003,
title = {New Generic Algorithms for Hard Knapsacks},
author = {Nick Howgrave-Graham and Antoine Joux},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {235--256},
doi = {10.1007/978-3-642-13190-5_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24004,
title = {Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation},
author = {Jooyoung Lee and John P. Steinberger},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {573--596},
doi = {10.1007/978-3-642-13190-5_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24005,
title = {Efficient Lattice (H)IBE in the Standard Model},
author = {Shweta Agrawal and Dan Boneh and Xavier Boyen},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {553--572},
doi = {10.1007/978-3-642-13190-5_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24006,
title = {Public-Key Encryption in the Bounded-Retrieval Model},
author = {Jo\"el Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {113--134},
doi = {10.1007/978-3-642-13190-5_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24007,
title = {Computational Soundness, Co-induction, and Encryption Cycles},
author = {Daniele Micciancio},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {362--380},
doi = {10.1007/978-3-642-13190-5_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24008,
title = {Cryptography between Wonderland and Underland},
author = {Moti Yung},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {320--321},
doi = {10.1007/978-3-642-13190-5_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24009,
title = {Constructing Verifiable Random Functions with Large Input Spaces},
author = {Susan Hohenberger and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {656--672},
doi = {10.1007/978-3-642-13190-5_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24010,
title = {Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR},
author = {Kenneth G. Paterson and Gaven J. Watson},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {345--361},
doi = {10.1007/978-3-642-13190-5_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24011,
title = {Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others},
author = {Alex Biryukov and Ivica Nikolic},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {322--344},
doi = {10.1007/978-3-642-13190-5_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24012,
title = {Efficient Device-Independent Quantum Key Distribution},
author = {Esther H\"anggi and Renato Renner and Stefan Wolf},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {216--234},
doi = {10.1007/978-3-642-13190-5_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24013,
title = {Adaptively Secure Broadcast},
author = {Martin Hirt and Vassilis Zikas},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {466--485},
doi = {10.1007/978-3-642-13190-5_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24014,
title = {Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions},
author = {Rafael Pass and Hoeteck Wee},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {638--655},
doi = {10.1007/978-3-642-13190-5_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24015,
title = {Cryptographic Agility and Its Relation to Circular Encryption},
author = {Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {403--422},
doi = {10.1007/978-3-642-13190-5_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24016,
title = {Bounded Key-Dependent Message Security},
author = {Boaz Barak and Iftach Haitner and Dennis Hofheinz and Yuval Ishai},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {423--444},
doi = {10.1007/978-3-642-13190-5_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24017,
title = {Adaptive Trapdoor Functions and Chosen-Ciphertext Security},
author = {Eike Kiltz and Payman Mohassel and Adam O'Neill},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {673--692},
doi = {10.1007/978-3-642-13190-5_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24018,
title = {Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds},
author = {Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {299--319},
doi = {10.1007/978-3-642-13190-5_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24019,
title = {Fully Homomorphic Encryption over the Integers},
author = {Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {24--43},
doi = {10.1007/978-3-642-13190-5_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24020,
title = {Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography},
author = {Ivan Damg\r ard and Yuval Ishai and Mikkel Kr\oigaard},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {445--465},
doi = {10.1007/978-3-642-13190-5_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24021,
title = {Universal One-Way Hash Functions via Inaccessible Entropy},
author = {Iftach Haitner and Thomas Holenstein and Omer Reingold and Salil P. Vadhan and Hoeteck Wee},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {616--637},
doi = {10.1007/978-3-642-13190-5_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24022,
title = {Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks},
author = {Serge Fehr and Dennis Hofheinz and Eike Kiltz and Hoeteck Wee},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {381--402},
doi = {10.1007/978-3-642-13190-5_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24023,
title = {Secure Message Transmission with Small Public Discussion},
author = {Juan A. Garay and Clint Givens and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {177--196},
doi = {10.1007/978-3-642-13190-5_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{eurocrypt-2010-24024,
title = {Partial Fairness in Secure Two-Party Computation},
author = {S. Dov Gordon and Jonathan Katz},
booktitle = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {6110},
pages = {157--176},
doi = {10.1007/978-3-642-13190-5_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24064,
title = {Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher},
author = {Olivier Billet and Jonathan Etrog and Henri Gilbert},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {55--74},
doi = {10.1007/978-3-642-13858-4_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24065,
title = {Higher Order Differential Attack on Step-Reduced Variants of *Luffa* v1},
author = {Dai Watanabe and Yasuo Hatano and Tsuyoshi Yamada and Toshinobu Kaneko},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {270--285},
doi = {10.1007/978-3-642-13858-4_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24066,
title = {Finding Preimages of Tiger Up to 23 Steps},
author = {Lei Wang and Yu Sasaki},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {116--133},
doi = {10.1007/978-3-642-13858-4_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24067,
title = {Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations},
author = {Henri Gilbert and Thomas Peyrin},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {365--383},
doi = {10.1007/978-3-642-13858-4_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24068,
title = {A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs},
author = {Mridul Nandi},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {212--229},
doi = {10.1007/978-3-642-13858-4_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24069,
title = {Domain Extension for Enhanced Target Collision-Resistant Hash Functions},
author = {Ilya Mironov},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {153--167},
doi = {10.1007/978-3-642-13858-4_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@proceedings{fse-2010-23727,
title = {Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
author = {Seokhie Hong and Tetsu Iwata},
booktitle = {FSE},
volume = {6147},
url = {http://link.springer.com/book/10.1007/978-3-642-13858-4},
doi = {10.1007/978-3-642-13858-4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24025,
title = {Cryptanalysis of the DECT Standard Cipher},
author = {Karsten Nohl and Erik Tews and Ralf-Philipp Weinmann},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {1--18},
doi = {10.1007/978-3-642-13858-4_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24032,
title = {Another Look at Complementation Properties},
author = {Charles Bouillaguet and Orr Dunkelman and Ga\"etan Leurent and Pierre-Alain Fouque},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {347--364},
doi = {10.1007/978-3-642-13858-4_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24033,
title = {Differential and Invertibility Properties of BLAKE},
author = {Jean-Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {318--332},
doi = {10.1007/978-3-642-13858-4_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24034,
title = {How to Thwart Birthday Attacks against MACs via Small Randomness},
author = {Kazuhiko Minematsu},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {230--249},
doi = {10.1007/978-3-642-13858-4_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24035,
title = {Fast Software AES Encryption},
author = {Dag Arne Osvik and Joppe W. Bos and Deian Stefan and David Canright},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {75--93},
doi = {10.1007/978-3-642-13858-4_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24036,
title = {Pseudo-cryptanalysis of the Original Blue Midnight Wish},
author = {S\oren S. Thomsen},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {304--317},
doi = {10.1007/978-3-642-13858-4_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24037,
title = {Improving the Generalized Feistel},
author = {Tomoyasu Suzaki and Kazuhiko Minematsu},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {19--39},
doi = {10.1007/978-3-642-13858-4_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24038,
title = {Attacking the Knudsen-Preneel Compression Functions},
author = {Onur \"Ozen and Thomas Shrimpton and Martijn Stam},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {94--115},
doi = {10.1007/978-3-642-13858-4_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24048,
title = {Cryptanalysis of ESSENCE},
author = {Mar\'\ia Naya-Plasencia and Andrea R\"ock and Jean-Philippe Aumasson and Yann Laigle-Chapuy and Ga\"etan Leurent and Willi Meier and Thomas Peyrin},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {134--152},
doi = {10.1007/978-3-642-13858-4_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24049,
title = {Rebound Attack on Reduced-Round Versions of JH},
author = {Vincent Rijmen and Deniz Toz and Kerem Varici},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {286--303},
doi = {10.1007/978-3-642-13858-4_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24050,
title = {Security Analysis of the Mode of JH Hash Function},
author = {Rishiraj Bhattacharyya and Avradip Mandal and Mridul Nandi},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {168--191},
doi = {10.1007/978-3-642-13858-4_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24051,
title = {Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships},
author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {192--211},
doi = {10.1007/978-3-642-13858-4_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24052,
title = {Nonlinear Equivalence of Stream Ciphers},
author = {Sondre R\onjom and Carlos Cid},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {40--54},
doi = {10.1007/978-3-642-13858-4_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24053,
title = {Rotational Cryptanalysis of ARX},
author = {Dmitry Khovratovich and Ivica Nikolic},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {333--346},
doi = {10.1007/978-3-642-13858-4_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{fse-2010-24054,
title = {Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited},
author = {Liting Zhang and Wenling Wu and Peng Wang and Lei Zhang and Shuang Wu and Bo Liang},
booktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010},
volume = {6147},
pages = {250--269},
doi = {10.1007/978-3-642-13858-4_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@article{jofc-2010-23429,
title = {Structural Cryptanalysis of SASAS},
author = {Alex Biryukov and Adi Shamir},
journal = {J. Cryptology},
volume = {23},
pages = {505--518},
doi = {10.1007/s00145-010-9062-1},
year = {2010}
}
@article{jofc-2010-23430,
title = {Cryptanalysis of MD2},
author = {Lars R. Knudsen and John Erik Mathiassen and Fr\'ed\'eric Muller and S\oren S. Thomsen},
journal = {J. Cryptology},
volume = {23},
pages = {72--90},
doi = {10.1007/s00145-009-9054-1},
year = {2010}
}
@article{jofc-2010-23431,
title = {Parallel and Concurrent Security of the HB and HB^{+} Protocols},
author = {Jonathan Katz and Ji Sun Shin and Adam Smith},
journal = {J. Cryptology},
volume = {23},
pages = {402--421},
doi = {10.1007/s00145-010-9061-2},
year = {2010}
}
@article{jofc-2010-23432,
title = {The RSA Group is Pseudo-Free},
author = {Daniele Micciancio},
journal = {J. Cryptology},
volume = {23},
pages = {169--186},
doi = {10.1007/s00145-009-9042-5},
year = {2010}
}
@article{jofc-2010-23433,
title = {Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries},
author = {Carmit Hazay and Yehuda Lindell},
journal = {J. Cryptology},
volume = {23},
pages = {422--456},
doi = {10.1007/s00145-008-9034-x},
year = {2010}
}
@article{jofc-2010-23434,
title = {On *d*-Multiplicative Secret Sharing},
author = {Omer Barkol and Yuval Ishai and Enav Weinreb},
journal = {J. Cryptology},
volume = {23},
pages = {580--593},
doi = {10.1007/s00145-010-9056-z},
year = {2010}
}
@article{jofc-2010-23435,
title = {On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits},
author = {Oded Goldreich},
journal = {J. Cryptology},
volume = {23},
pages = {1--36},
doi = {10.1007/s00145-009-9050-5},
year = {2010}
}
@article{jofc-2010-23436,
title = {Discrete Logarithm Problems with Auxiliary Inputs},
author = {Jung Hee Cheon},
journal = {J. Cryptology},
volume = {23},
pages = {457--476},
doi = {10.1007/s00145-009-9047-0},
year = {2010}
}
@article{jofc-2010-23437,
title = {Secure Computation of the Median (and Other Elements of Specified Ranks)},
author = {Gagan Aggarwal and Nina Mishra and Benny Pinkas},
journal = {J. Cryptology},
volume = {23},
pages = {373--401},
doi = {10.1007/s00145-010-9059-9},
year = {2010}
}
@article{jofc-2010-23438,
title = {Obfuscation for Cryptographic Purposes},
author = {Dennis Hofheinz and John Malone-Lee and Martijn Stam},
journal = {J. Cryptology},
volume = {23},
pages = {121--168},
doi = {10.1007/s00145-009-9046-1},
year = {2010}
}
@article{jofc-2010-23439,
title = {A Taxonomy of Pairing-Friendly Elliptic Curves},
author = {David Freeman and Michael Scott and Edlyn Teske},
journal = {J. Cryptology},
volume = {23},
pages = {224--280},
doi = {10.1007/s00145-009-9048-z},
year = {2010}
}
@article{jofc-2010-23440,
title = {On the Efficient Generation of Prime-Order Elliptic Curves},
author = {Elisavet Konstantinou and Aristides Kontogeorgis and Yannis C. Stamatiou and Christos D. Zaroliagis},
journal = {J. Cryptology},
volume = {23},
pages = {477--503},
doi = {10.1007/s00145-009-9037-2},
year = {2010}
}
@article{jofc-2010-23441,
title = {An Analysis of the Blockcipher-Based Hash Functions from PGV},
author = {John Black and Phillip Rogaway and Thomas Shrimpton and Martijn Stam},
journal = {J. Cryptology},
volume = {23},
pages = {519--545},
doi = {10.1007/s00145-010-9071-0},
year = {2010}
}
@article{jofc-2010-23442,
title = {How Should We Solve Search Problems Privately?},
author = {Amos Beimel and Tal Malkin and Kobbi Nissim and Enav Weinreb},
journal = {J. Cryptology},
volume = {23},
pages = {344--371},
doi = {10.1007/s00145-008-9032-z},
year = {2010}
}
@article{jofc-2010-23443,
title = {Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries},
author = {Yonatan Aumann and Yehuda Lindell},
journal = {J. Cryptology},
volume = {23},
pages = {281--343},
doi = {10.1007/s00145-009-9040-7},
year = {2010}
}
@article{jofc-2010-23444,
title = {A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack},
author = {Yvo Desmedt and Rosario Gennaro and Kaoru Kurosawa and Victor Shoup},
journal = {J. Cryptology},
volume = {23},
pages = {91--120},
doi = {10.1007/s00145-009-9051-4},
year = {2010}
}
@article{jofc-2010-23445,
title = {Efficient Cache Attacks on AES, and Countermeasures},
author = {Dag Arne Osvik and Adi Shamir and Eran Tromer},
journal = {J. Cryptology},
volume = {23},
pages = {37--71},
doi = {10.1007/s00145-009-9049-y},
year = {2010}
}
@article{jofc-2010-23446,
title = {Long-Term Security and Universal Composability},
author = {J\"orn M\"uller-Quade and Dominique Unruh},
journal = {J. Cryptology},
volume = {23},
pages = {594--671},
doi = {10.1007/s00145-010-9068-8},
year = {2010}
}
@article{jofc-2010-23447,
title = {A Verifiable Secret Shuffle of Homomorphic Encryptions},
author = {Jens Groth},
journal = {J. Cryptology},
volume = {23},
pages = {546--579},
doi = {10.1007/s00145-010-9067-9},
year = {2010}
}
@article{jofc-2010-23448,
title = {The TLS Handshake Protocol: A Modular Analysis},
author = {Paul Morrissey and Nigel P. Smart and Bogdan Warinschi},
journal = {J. Cryptology},
volume = {23},
pages = {187--223},
doi = {10.1007/s00145-009-9052-3},
year = {2010}
}
@proceedings{pkc-2010-23399,
title = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
booktitle = {PKC},
volume = {6056},
url = {http://link.springer.com/book/10.1007/978-3-642-13013-7},
doi = {10.1007/978-3-642-13013-7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23400,
title = {Unlinkability of Sanitizable Signatures},
author = {Christina Brzuska and Marc Fischlin and Anja Lehmann and Dominique Schr\"oder},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {444--461},
doi = {10.1007/978-3-642-13013-7_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23401,
title = {Implicit Factoring with Shared Most Significant and Middle Bits},
author = {Jean-Charles Faug\`ere and Rapha\"el Marinier and Gu\'ena\"el Renault},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {70--87},
doi = {10.1007/978-3-642-13013-7_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23402,
title = {Identity-Based Aggregate and Multi-Signature Schemes Based on RSA},
author = {Ali Bagherzandi and Stanislaw Jarecki},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {480--498},
doi = {10.1007/978-3-642-13013-7_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23403,
title = {Secure Network Coding over the Integers},
author = {Rosario Gennaro and Jonathan Katz and Hugo Krawczyk and Tal Rabin},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {142--160},
doi = {10.1007/978-3-642-13013-7_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23404,
title = "Solving a 676-Bit Discrete Logarithm Problem in $GF(3^{6n})$",
author = {Takuya Hayashi and Shin'ichiro Matsuo and Naoyuki Shinohara and Masaaki Shirase and Tsuyoshi Takagi and Lihua Wang},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {351--367},
doi = {10.1007/978-3-642-13013-7_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23405,
title = {Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions},
author = {Petros Mol and Scott Yilek},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {296--311},
doi = {10.1007/978-3-642-13013-7_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23406,
title = {Preventing Pollution Attacks in Multi-source Network Coding},
author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {161--176},
doi = {10.1007/978-3-642-13013-7_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23407,
title = {Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA},
author = {Mathias Herrmann and Alexander May},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {53--69},
doi = {10.1007/978-3-642-13013-7_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23408,
title = {Confidential Signatures and Deterministic Signcryption},
author = {Alexander W. Dent and Marc Fischlin and Mark Manulis and Dominique Schr\"oder and Martijn Stam},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {462--479},
doi = {10.1007/978-3-642-13013-7_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23409,
title = {Text Search Protocols with Simulation Based Security},
author = {Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {332--350},
doi = {10.1007/978-3-642-13013-7_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23410,
title = {Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments},
author = {Zhenfu Cao and Ivan Visconti and Zongyang Zhang},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {193--208},
doi = {10.1007/978-3-642-13013-7_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23411,
title = {Constant Size Ciphertexts in Threshold Attribute-Based Encryption},
author = {Javier Herranz and Fabien Laguillaumie and Carla R\`afols},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {19--34},
doi = {10.1007/978-3-642-13013-7_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23412,
title = {Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes},
author = {Nigel P. Smart and Frederik Vercauteren},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {420--443},
doi = {10.1007/978-3-642-13013-7_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23413,
title = {Faster Pairing Computations on Curves with High-Degree Twists},
author = {Craig Costello and Tanja Lange and Michael Naehrig},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {224--242},
doi = {10.1007/978-3-642-13013-7_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23414,
title = {CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model},
author = {Toshihide Matsuda and Ryo Nishimaki and Keisuke Tanaka},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {261--278},
doi = {10.1007/978-3-642-13013-7_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23415,
title = {Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting},
author = {Xinyi Huang and Yi Mu and Willy Susilo and Wei Wu and Yang Xiang},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {124--141},
doi = {10.1007/978-3-642-13013-7_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23416,
title = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval},
author = {Steven D. Galbraith and Raminder S. Ruprai},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {368--383},
doi = {10.1007/978-3-642-13013-7_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23417,
title = {Multi-query Computationally-Private Information Retrieval with Constant Communication Rate},
author = {Jens Groth and Aggelos Kiayias and Helger Lipmaa},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {107--123},
doi = {10.1007/978-3-642-13013-7_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23418,
title = {Security of Encryption Schemes in Weakened Random Oracle Models},
author = {Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {403--419},
doi = {10.1007/978-3-642-13013-7_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23419,
title = {Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions},
author = {Robert Granger and Michael Scott},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {209--223},
doi = {10.1007/978-3-642-13013-7_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23420,
title = {Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More},
author = {Xavier Boyen},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {499--517},
doi = {10.1007/978-3-642-13013-7_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23421,
title = {Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem},
author = {Jean-Charles Faug\`ere and Pierre-Jean Spaenlehauer},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {35--52},
doi = {10.1007/978-3-642-13013-7_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23422,
title = {Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model},
author = {Kristiyan Haralambiev and Tibor Jager and Eike Kiltz and Victor Shoup},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {1--18},
doi = {10.1007/978-3-642-13013-7_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23423,
title = {More Constructions of Lossy and Correlation-Secure Trapdoor Functions},
author = {David Mandell Freeman and Oded Goldreich and Eike Kiltz and Alon Rosen and Gil Segev},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {279--295},
doi = {10.1007/978-3-642-13013-7_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23424,
title = {Efficient Set Operations in the Presence of Malicious Adversaries},
author = {Carmit Hazay and Kobbi Nissim},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {312--331},
doi = {10.1007/978-3-642-13013-7_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23425,
title = {On the Feasibility of Consistent Computations},
author = {Sven Laur and Helger Lipmaa},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {88--106},
doi = {10.1007/978-3-642-13013-7_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23426,
title = {Groth-Sahai Proofs Revisited},
author = {Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {177--192},
doi = {10.1007/978-3-642-13013-7_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23427,
title = {Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation},
author = {Nuttapong Attrapadung and Beno\^\it Libert},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {384--402},
doi = {10.1007/978-3-642-13013-7_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{pkc-2010-23428,
title = {Efficient Arithmetic on Hessian Curves},
author = {Reza Rezaeian Farashahi and Marc Joye},
booktitle = {Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
volume = {6056},
pages = {243--260},
doi = {10.1007/978-3-642-13013-7_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@proceedings{tcc-2010-18733,
title = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
booktitle = {TCC},
volume = {5978},
url = {http://link.springer.com/book/10.1007/978-3-642-11799-2},
doi = {10.1007/978-3-642-11799-2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18734,
title = {Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model},
author = {Rafael Pass and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {518--534},
doi = {10.1007/978-3-642-11799-2_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18735,
title = {Almost Optimal Bounds for Direct Product Threshold Theorem},
author = {Charanjit S. Jutla},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {37--51},
doi = {10.1007/978-3-642-11799-2_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18736,
title = {Composition of Zero-Knowledge Proofs with Efficient Provers},
author = {Eleanor Birrell and Salil P. Vadhan},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {572--587},
doi = {10.1007/978-3-642-11799-2_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18737,
title = {On Symmetric Encryption and Point Obfuscation},
author = {Ran Canetti and Yael Tauman Kalai and Mayank Varia and Daniel Wichs},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {52--71},
doi = {10.1007/978-3-642-11799-2_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18738,
title = {Ideal Hierarchical Secret Sharing Schemes},
author = {Oriol Farr\`as and Carles Padr\'o},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {219--236},
doi = {10.1007/978-3-642-11799-2_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18739,
title = {On Related-Secret Pseudorandomness},
author = {David Goldenberg and Moses Liskov},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {255--272},
doi = {10.1007/978-3-642-11799-2_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18740,
title = {Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs},
author = {Yevgeniy Vahlis},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {165--182},
doi = {10.1007/978-3-642-11799-2_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18741,
title = {Bounds on the Sample Complexity for Private Learning and Private Data Release},
author = {Amos Beimel and Shiva Prasad Kasiviswanathan and Kobbi Nissim},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {437--454},
doi = {10.1007/978-3-642-11799-2_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18742,
title = {Secure Computation and Its Diverse Applications},
author = {Yuval Ishai},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {90},
doi = {10.1007/978-3-642-11799-2_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18743,
title = {Private Coins versus Public Coins in Zero-Knowledge Proof Systems},
author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {588--605},
doi = {10.1007/978-3-642-11799-2_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18744,
title = {Efficient, Robust and Constant-Round Distributed RSA Key Generation},
author = {Ivan Damg\r ard and Gert L\aess\oe Mikkelsen},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {183--200},
doi = {10.1007/978-3-642-11799-2_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18745,
title = {An Efficient Parallel Repetition Theorem},
author = {Johan H\r astad and Rafael Pass and Douglas Wikstr\"om and Krzysztof Pietrzak},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {1--18},
doi = {10.1007/978-3-642-11799-2_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18746,
title = {Public-Key Encryption Schemes with Auxiliary Inputs},
author = {Yevgeniy Dodis and Shafi Goldwasser and Yael Tauman Kalai and Chris Peikert and Vinod Vaikuntanathan},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {361--381},
doi = {10.1007/978-3-642-11799-2_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18747,
title = {Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge},
author = {Rafail Ostrovsky and Omkant Pandey and Ivan Visconti},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {535--552},
doi = {10.1007/978-3-642-11799-2_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18748,
title = {On the Necessary and Sufficient Assumptions for UC Computation},
author = {Ivan Damg\r ard and Jesper Buus Nielsen and Claudio Orlandi},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {109--127},
doi = {10.1007/978-3-642-11799-2_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18749,
title = {From Passive to Covert Security at Low Cost},
author = {Ivan Damg\r ard and Martin Geisler and Jesper Buus Nielsen},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {128--145},
doi = {10.1007/978-3-642-11799-2_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18750,
title = {On Complete Primitives for Fairness},
author = {S. Dov Gordon and Yuval Ishai and Tal Moran and Rafail Ostrovsky and Amit Sahai},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {91--108},
doi = {10.1007/978-3-642-11799-2_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18751,
title = {Rationality in the Full-Information Model},
author = {Ronen Gradwohl},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {401--418},
doi = {10.1007/978-3-642-11799-2_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18752,
title = {Parallel Repetition Theorems for Interactive Arguments},
author = {Kai-Min Chung and Feng-Hao Liu},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {19--36},
doi = {10.1007/978-3-642-11799-2_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18753,
title = {Efficiency Limitations for Î£-Protocols for Group Homomorphisms},
author = {Endre Bangerter and Jan Camenisch and Stephan Krenn},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {553--571},
doi = {10.1007/978-3-642-11799-2_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18754,
title = {A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch},
author = {Ueli M. Maurer and Stefano Tessaro},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {237--254},
doi = {10.1007/978-3-642-11799-2_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18755,
title = {A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems},
author = {Ronald Cramer and Dennis Hofheinz and Eike Kiltz},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {146--164},
doi = {10.1007/978-3-642-11799-2_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18756,
title = {Delayed-Key Message Authentication for Streams},
author = {Marc Fischlin and Anja Lehmann},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {290--307},
doi = {10.1007/978-3-642-11799-2_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18757,
title = {Founding Cryptography on Tamper-Proof Hardware Tokens},
author = {Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {308--326},
doi = {10.1007/978-3-642-11799-2_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18758,
title = {Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens},
author = {Vladimir Kolesnikov},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {327--342},
doi = {10.1007/978-3-642-11799-2_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18759,
title = {Privacy-Enhancing Cryptography: From Theory into Practice},
author = {Jan Camenisch},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {498},
doi = {10.1007/978-3-642-11799-2_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18760,
title = {A Domain Extender for the Ideal Cipher},
author = {Jean-S\'ebastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {273--289},
doi = {10.1007/978-3-642-11799-2_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18761,
title = {Obfuscation of Hyperplane Membership},
author = {Ran Canetti and Guy N. Rothblum and Mayank Varia},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {72--89},
doi = {10.1007/978-3-642-11799-2_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18762,
title = {Leakage-Resilient Signatures},
author = {Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy N. Rothblum},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {343--360},
doi = {10.1007/978-3-642-11799-2_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18763,
title = {Efficient Rational Secret Sharing in Standard Communication Networks},
author = {Georg Fuchsbauer and Jonathan Katz and David Naccache},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {419--436},
doi = {10.1007/978-3-642-11799-2_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18764,
title = {Robust Encryption},
author = {Michel Abdalla and Mihir Bellare and Gregory Neven},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {480--497},
doi = {10.1007/978-3-642-11799-2_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18765,
title = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems},
author = {Rikke Bendlin and Ivan Damg\r ard},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {201--218},
doi = {10.1007/978-3-642-11799-2_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18766,
title = {New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts},
author = {Allison B. Lewko and Brent Waters},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {455--479},
doi = {10.1007/978-3-642-11799-2_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18767,
title = {Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs},
author = {Beno\^\it Libert and Moti Yung},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {499--517},
doi = {10.1007/978-3-642-11799-2_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@inproceedings{tcc-2010-18768,
title = {Public-Key Cryptographic Primitives Provably as Secure as Subset Sum},
author = {Vadim Lyubashevsky and Adriana Palacio and Gil Segev},
booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
volume = {5978},
pages = {382--400},
doi = {10.1007/978-3-642-11799-2_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2010}
}
@proceedings{asiacrypt-2009-18531,
title = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
booktitle = {ASIACRYPT},
volume = {5912},
url = {http://link.springer.com/book/10.1007/978-3-642-10366-7},
doi = {10.1007/978-3-642-10366-7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18532,
title = {Zero Knowledge in the Random Oracle Model, Revisited},
author = {Hoeteck Wee},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {417--434},
doi = {10.1007/978-3-642-10366-7_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18533,
title = {Secure Two-Party Computation Is Practical},
author = {Benny Pinkas and Thomas Schneider and Nigel P. Smart and Stephen C. Williams},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {250--267},
doi = {10.1007/978-3-642-10366-7_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18534,
title = {Secure Multi-party Computation Minimizing Online Rounds},
author = {Seung Geol Choi and Ariel Elbaz and Tal Malkin and Moti Yung},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {268--286},
doi = {10.1007/978-3-642-10366-7_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18535,
title = {Hedged Public-Key Encryption: How to Protect against Bad Randomness},
author = {Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {232--249},
doi = {10.1007/978-3-642-10366-7_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18536,
title = {Foundations of Non-malleable Hash and One-Way Functions},
author = {Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {524--541},
doi = {10.1007/978-3-642-10366-7_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18537,
title = {Cryptanalysis of the Square Cryptosystems},
author = {Olivier Billet and Gilles Macario-Rat},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {451--468},
doi = {10.1007/978-3-642-10366-7_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18538,
title = {Security Notions and Generic Constructions for Client Puzzles},
author = {Liqun Chen and Paul Morrissey and Nigel P. Smart and Bogdan Warinschi},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {505--523},
doi = {10.1007/978-3-642-10366-7_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18539,
title = {On the Power of Two-Party Quantum Cryptography},
author = {Louis Salvail and Christian Schaffner and Miroslava Sot\'akov\'a},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {70--87},
doi = {10.1007/978-3-642-10366-7_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18540,
title = {Quantum-Secure Coin-Flipping and Applications},
author = {Ivan Damg\r ard and Carolin Lunemann},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {52--69},
doi = {10.1007/978-3-642-10366-7_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18541,
title = {The Key-Dependent Attack on Block Ciphers},
author = {Xiaorui Sun and Xuejia Lai},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {19--36},
doi = {10.1007/978-3-642-10366-7_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18542,
title = {A Framework for Universally Composable Non-committing Blind Signatures},
author = {Masayuki Abe and Miyako Ohkubo},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {435--450},
doi = {10.1007/978-3-642-10366-7_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18543,
title = {Hierarchical Predicate Encryption for Inner-Products},
author = {Tatsuaki Okamoto and Katsuyuki Takashima},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {214--231},
doi = {10.1007/978-3-642-10366-7_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18544,
title = {Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices},
author = {Jonathan Katz and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {636--652},
doi = {10.1007/978-3-642-10366-7_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18545,
title = {Group Encryption: Non-interactive Realization in the Standard Model},
author = {Julien Cathalo and Beno\^\it Libert and Moti Yung},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {179--196},
doi = {10.1007/978-3-642-10366-7_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18546,
title = {Improved Cryptanalysis of Skein},
author = {Jean-Philippe Aumasson and \c Cagdas \c Calik and Willi Meier and Onur \"Ozen and Raphael C.-W. Phan and Kerem Varici},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {542--559},
doi = {10.1007/978-3-642-10366-7_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18547,
title = {MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners},
author = {Florian Mendel and Christian Rechberger and Martin Schl\"affer},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {144--161},
doi = {10.1007/978-3-642-10366-7_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18548,
title = {Rebound Attack on the Full Lane Compression Function},
author = {Krystian Matusiewicz and Mar\'\ia Naya-Plasencia and Ivica Nikolic and Yu Sasaki and Martin Schl\"affer},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {106--125},
doi = {10.1007/978-3-642-10366-7_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18549,
title = {Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions},
author = {Frederik Armknecht and Roel Maes and Ahmad-Reza Sadeghi and Berk Sunar and Pim Tuyls},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {685--702},
doi = {10.1007/978-3-642-10366-7_40},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18550,
title = {Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures},
author = {Vadim Lyubashevsky},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {598--616},
doi = {10.1007/978-3-642-10366-7_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18551,
title = {Related-Key Cryptanalysis of the Full AES-192 and AES-256},
author = {Alex Biryukov and Dmitry Khovratovich},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {1--18},
doi = {10.1007/978-3-642-10366-7_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18552,
title = {Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?},
author = {Mathias Herrmann and Alexander May},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {487--504},
doi = {10.1007/978-3-642-10366-7_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18553,
title = {Proofs of Storage from Homomorphic Identification Protocols},
author = {Giuseppe Ateniese and Seny Kamara and Jonathan Katz},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {319--333},
doi = {10.1007/978-3-642-10366-7_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18554,
title = {PSS Is Secure against Random Fault Attacks},
author = {Jean-S\'ebastien Coron and Avradip Mandal},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {653--666},
doi = {10.1007/978-3-642-10366-7_38},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18555,
title = {The Intel AES Instructions Set and the SHA-3 Candidates},
author = {Ryad Benadjila and Olivier Billet and Shay Gueron and Matthew J. B. Robshaw},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {162--178},
doi = {10.1007/978-3-642-10366-7_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18556,
title = {Improved Generic Algorithms for 3-Collisions},
author = {Antoine Joux and Stefan Lucks},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {347--363},
doi = {10.1007/978-3-642-10366-7_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18557,
title = {Cache-Timing Template Attacks},
author = {Billy Bob Brumley and Risto M. Hakala},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {667--684},
doi = {10.1007/978-3-642-10366-7_39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18558,
title = {A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical},
author = {Anja Lehmann and Stefano Tessaro},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {364--381},
doi = {10.1007/978-3-642-10366-7_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18559,
title = {Security Bounds for the Design of Code-Based Cryptosystems},
author = {Matthieu Finiasz and Nicolas Sendrier},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {88--105},
doi = {10.1007/978-3-642-10366-7_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18560,
title = {Preimages for Step-Reduced SHA-2},
author = {Kazumaro Aoki and Jian Guo and Krystian Matusiewicz and Yu Sasaki and Lei Wang},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {578--597},
doi = {10.1007/978-3-642-10366-7_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18561,
title = {Rebound Distinguishers: Results on the Full Whirlpool Compression Function},
author = {Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schl\"affer},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {126--143},
doi = {10.1007/978-3-642-10366-7_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18562,
title = {Simple Adaptive Oblivious Transfer without Random Oracle},
author = {Kaoru Kurosawa and Ryo Nojima},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {334--346},
doi = {10.1007/978-3-642-10366-7_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18563,
title = {Signature Schemes with Bounded Leakage Resilience},
author = {Jonathan Katz and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {703--720},
doi = {10.1007/978-3-642-10366-7_41},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18564,
title = {Improved Non-committing Encryption with Applications to Adaptively Secure Protocols},
author = {Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {287--302},
doi = {10.1007/978-3-642-10366-7_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18565,
title = {Efficient Public Key Encryption Based on Ideal Lattices},
author = {Damien Stehl\'e and Ron Steinfeld and Keisuke Tanaka and Keita Xagawa},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {617--635},
doi = {10.1007/978-3-642-10366-7_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18566,
title = {On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations},
author = {Jonathan Katz and Arkady Yerukhimovich},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {197--213},
doi = {10.1007/978-3-642-10366-7_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18567,
title = {Linearization Framework for Collision Attacks: Application to CubeHash and MD6},
author = {Eric Brier and Shahram Khazaei and Willi Meier and Thomas Peyrin},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {560--577},
doi = {10.1007/978-3-642-10366-7_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18568,
title = {How to Confirm Cryptosystems Security: The Original Merkle-Damg\r ard Is Still Alive!},
author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {382--398},
doi = {10.1007/978-3-642-10366-7_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18569,
title = {On the Analysis of Cryptographic Assumptions in the Generic Ring Model},
author = {Tibor Jager and J\"org Schwenk},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {399--416},
doi = {10.1007/978-3-642-10366-7_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18570,
title = {Factoring *pq*^{2} with Quadratic Forms: Nice Cryptanalyses},
author = {Guilhem Castagnos and Antoine Joux and Fabien Laguillaumie and Phong Q. Nguyen},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {469--486},
doi = {10.1007/978-3-642-10366-7_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18571,
title = {Non-malleable Statistically Hiding Commitment from Any One-Way Function},
author = {Zongyang Zhang and Zhenfu Cao and Ning Ding and Rong Ma},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {303--318},
doi = {10.1007/978-3-642-10366-7_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2009-18572,
title = {Cascade Encryption Revisited},
author = {Peter Gazi and Ueli M. Maurer},
booktitle = {Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings},
volume = {5912},
pages = {37--51},
doi = {10.1007/978-3-642-10366-7_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@proceedings{ches-2009-18573,
title = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
booktitle = {CHES},
volume = {5747},
url = {http://link.springer.com/book/10.1007/978-3-642-04138-9},
doi = {10.1007/978-3-642-04138-9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18574,
title = {Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers},
author = {Matthieu Rivain and Emmanuel Prouff and Julien Doget},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {171--188},
doi = {10.1007/978-3-642-04138-9_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18575,
title = {Differential Fault Analysis on DES Middle Rounds},
author = {Matthieu Rivain},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {457--469},
doi = {10.1007/978-3-642-04138-9_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18576,
title = {Crypto Engineering: Some History and Some Case Studies},
author = {Christof Paar},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {220--224},
doi = {10.1007/978-3-642-04138-9_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18577,
title = {A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques},
author = {Minoru Saeki and Daisuke Suzuki and Koichi Shimizu and Akashi Satoh},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {189--204},
doi = {10.1007/978-3-642-04138-9_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18578,
title = {Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security},
author = {Xu Guo and Junfeng Fan and Patrick Schaumont and Ingrid Verbauwhede},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {289--303},
doi = {10.1007/978-3-642-04138-9_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18579,
title = {Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers},
author = {Jean-Luc Beuchat and J\'er\'emie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodr\'\iguez-Henr\'\iquez},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {225--239},
doi = {10.1007/978-3-642-04138-9_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18580,
title = {CDs Have Fingerprints Too},
author = {Ghaith Hammouri and Aykutlu Dana and Berk Sunar},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {348--362},
doi = {10.1007/978-3-642-04138-9_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18581,
title = {A New Side-Channel Attack on RSA Prime Generation},
author = {Thomas Finke and Max Gebhardt and Werner Schindler},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {141--155},
doi = {10.1007/978-3-642-04138-9_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18582,
title = {Accelerating AES with Vector Permute Instructions},
author = {Mike Hamburg},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {18--32},
doi = {10.1007/978-3-642-04138-9_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18583,
title = {Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs},
author = {Roel Maes and Pim Tuyls and Ingrid Verbauwhede},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {332--347},
doi = {10.1007/978-3-642-04138-9_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18584,
title = {Physical Unclonable Functions and Secure Processors},
author = {Srini Devadas},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {65},
doi = {10.1007/978-3-642-04138-9_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18585,
title = {Practical Electromagnetic Template Attack on HMAC},
author = {Pierre-Alain Fouque and Ga\"etan Leurent and Denis R\'eal and Fr\'ed\'eric Valette},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {66--80},
doi = {10.1007/978-3-642-04138-9_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18586,
title = {Differential Cluster Analysis},
author = {Lejla Batina and Benedikt Gierlichs and Kerstin Lemke-Rust},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {112--127},
doi = {10.1007/978-3-642-04138-9_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18587,
title = {MicroEliece: McEliece for Embedded Devices},
author = {Thomas Eisenbarth and Tim G\"uneysu and Stefan Heyse and Christof Paar},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {49--64},
doi = {10.1007/978-3-642-04138-9_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18588,
title = {Mutual Information Analysis: How, When and Why?},
author = {Nicolas Veyrat-Charvillon and Fran\c cois-Xavier Standaert},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {429--443},
doi = {10.1007/978-3-642-04138-9_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18589,
title = {SSE Implementation of Multivariate PKCs on Modern x86 CPUs},
author = {Anna Inn-Tung Chen and Ming-Shing Chen and Tien-Ren Chen and Chen-Mou Cheng and Jintai Ding and Eric Li-Hsiang Kuo and Frost Yu-Shuang Lee and Bo-Yin Yang},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {33--48},
doi = {10.1007/978-3-642-04138-9_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18590,
title = {MERO: A Statistical Approach for Hardware Trojan Detection},
author = {Rajat Subhra Chakraborty and Francis G. Wolff and Somnath Paul and Christos A. Papachristou and Swarup Bhunia},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {396--410},
doi = {10.1007/978-3-642-04138-9_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18591,
title = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure},
author = {Emmanuel Prouff and Robert P. McEvoy},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {81--96},
doi = {10.1007/978-3-642-04138-9_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18592,
title = {Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves},
author = {Junfeng Fan and Frederik Vercauteren and Ingrid Verbauwhede},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {240--253},
doi = {10.1007/978-3-642-04138-9_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18593,
title = {Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA},
author = {Mathieu Renauld and Fran\c cois-Xavier Standaert and Nicolas Veyrat-Charvillon},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {97--111},
doi = {10.1007/978-3-642-04138-9_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18594,
title = {A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions},
author = {Francesco Regazzoni and Alessandro Cevrero and Fran\c cois-Xavier Standaert and St\'ephane Badel and Theo Kluter and Philip Brisk and Yusuf Leblebici and Paolo Ienne},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {205--219},
doi = {10.1007/978-3-642-04138-9_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18595,
title = {Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering},
author = {Lang Lin and Markus Kasper and Tim G\"uneysu and Christof Paar and Wayne Burleson},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {382--395},
doi = {10.1007/978-3-642-04138-9_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18596,
title = {Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves},
author = {David Kammler and Diandian Zhang and Peter Schwabe and Hanno Scharw\"achter and Markus Langenberg and Dominik Auras and Gerd Ascheid and Rudolf Mathar},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {254--271},
doi = {10.1007/978-3-642-04138-9_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18597,
title = {On Tamper-Resistance from a Theoretical Viewpoint},
author = {Paulo Mateus and Serge Vaudenay},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {411--428},
doi = {10.1007/978-3-642-04138-9_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18598,
title = {The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators},
author = {A. Theodore Markettos and Simon W. Moore},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {317--331},
doi = {10.1007/978-3-642-04138-9_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18599,
title = {Fault Attacks on RSA Signatures with Partially Unknown Messages},
author = {Jean-S\'ebastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {444--456},
doi = {10.1007/978-3-642-04138-9_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18600,
title = {Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication},
author = {Martin Hlav\'ac},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {128--140},
doi = {10.1007/978-3-642-04138-9_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18601,
title = {Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases},
author = {Nicolas Meloni and M. Anwar Hasan},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {304--316},
doi = {10.1007/978-3-642-04138-9_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18602,
title = {Faster and Timing-Attack Resistant AES-GCM},
author = {Emilia K\"asper and Peter Schwabe},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {1--17},
doi = {10.1007/978-3-642-04138-9_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18603,
title = {KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers},
author = {Christophe De Canni\`ere and Orr Dunkelman and Miroslav Knezevic},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {272--288},
doi = {10.1007/978-3-642-04138-9_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18604,
title = {An Efficient Method for Random Delay Generation in Embedded Software},
author = {Jean-S\'ebastien Coron and Ilya Kizhvatov},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {156--170},
doi = {10.1007/978-3-642-04138-9_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{ches-2009-18605,
title = {The State-of-the-Art in IC Reverse Engineering},
author = {Randy Torrance and Dick James},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
volume = {5747},
pages = {363--381},
doi = {10.1007/978-3-642-04138-9_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23852,
title = {Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over *Any* Fixed Finite Field},
author = {Ignacio Cascudo Pueyo and Hao Chen and Ronald Cramer and Chaoping Xing},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {466--486},
doi = {10.1007/978-3-642-03356-8_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23856,
title = {Abstraction in Cryptography},
author = {Ueli M. Maurer},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {465},
doi = {10.1007/978-3-642-03356-8_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23857,
title = {The Round Complexity of Verifiable Secret Sharing Revisited},
author = {Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {487--504},
doi = {10.1007/978-3-642-03356-8_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23860,
title = {Smooth Projective Hashing for Conditionally Extractable Commitments},
author = {Michel Abdalla and C\'eline Chevalier and David Pointcheval},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {671--689},
doi = {10.1007/978-3-642-03356-8_39},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23861,
title = {How to Encipher Messages on a Small Domain},
author = {Ben Morris and Phillip Rogaway and Till Stegers},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {286--302},
doi = {10.1007/978-3-642-03356-8_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23886,
title = {Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model},
author = {Jo\"el Alwen and Yevgeniy Dodis and Daniel Wichs},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {36--54},
doi = {10.1007/978-3-642-03356-8_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23889,
title = {Computational Differential Privacy},
author = {Ilya Mironov and Omkant Pandey and Omer Reingold and Salil P. Vadhan},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {126--142},
doi = {10.1007/978-3-642-03356-8_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23890,
title = {How Risky Is the Random-Oracle Model?},
author = {Ga\"etan Leurent and Phong Q. Nguyen},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {445--464},
doi = {10.1007/978-3-642-03356-8_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23891,
title = {Merkle Puzzles Are Optimal - An *O*(*n*^{2})-Query Attack on Any Key Exchange from a Random Oracle},
author = {Boaz Barak and Mohammad Mahmoody-Ghidary},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {374--390},
doi = {10.1007/978-3-642-03356-8_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23893,
title = {Short and Stateless Signatures from the RSA Assumption},
author = {Susan Hohenberger and Brent Waters},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {654--670},
doi = {10.1007/978-3-642-03356-8_38},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23894,
title = {Reconstructing RSA Private Keys from Random Key Bits},
author = {Nadia Heninger and Hovav Shacham},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {1--17},
doi = {10.1007/978-3-642-03356-8_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23895,
title = {New Birthday Attacks on Some MACs Based on Block Ciphers},
author = {Zheng Yuan and Wei Wang and Keting Jia and Guangwu Xu and Xiaoyun Wang},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {209--230},
doi = {10.1007/978-3-642-03356-8_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23896,
title = {On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem},
author = {Vadim Lyubashevsky and Daniele Micciancio},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {577--594},
doi = {10.1007/978-3-642-03356-8_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23897,
title = {Batch Binary Edwards},
author = {Daniel J. Bernstein},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {317--336},
doi = {10.1007/978-3-642-03356-8_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23898,
title = {On the Composition of Public-Coin Zero-Knowledge Protocols},
author = {Rafael Pass and Wei-Lung Dustin Tseng and Douglas Wikstr\"om},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {160--176},
doi = {10.1007/978-3-642-03356-8_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23899,
title = {Randomizable Proofs and Delegatable Anonymous Credentials},
author = {Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {108--125},
doi = {10.1007/978-3-642-03356-8_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23900,
title = {Improving the Security of Quantum Protocols via Commit-and-Open},
author = {Ivan Damg\r ard and Serge Fehr and Carolin Lunemann and Louis Salvail and Christian Schaffner},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {408--427},
doi = {10.1007/978-3-642-03356-8_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23901,
title = {Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions},
author = {Brent Waters},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {619--636},
doi = {10.1007/978-3-642-03356-8_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23902,
title = {Probabilistically Checkable Arguments},
author = {Yael Tauman Kalai and Ran Raz},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {143--159},
doi = {10.1007/978-3-642-03356-8_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23903,
title = {Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate},
author = {Marc Stevens and Alexander Sotirov and Jacob Appelbaum and Arjen K. Lenstra and David Molnar and Dag Arne Osvik and Benne de Weger},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {55--69},
doi = {10.1007/978-3-642-03356-8_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23904,
title = {Solving Hidden Number Problem with One Bit Oracle and Advice},
author = {Adi Akavia},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {337--354},
doi = {10.1007/978-3-642-03356-8_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23905,
title = {Public-Key Cryptosystems Resilient to Key Leakage},
author = {Moni Naor and Gil Segev},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {18--35},
doi = {10.1007/978-3-642-03356-8_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23906,
title = {Computational Indistinguishability Amplification: Tight Product Theorems for System Composition},
author = {Ueli M. Maurer and Stefano Tessaro},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {355--373},
doi = {10.1007/978-3-642-03356-8_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23907,
title = {Distinguisher and Related-Key Attack on the Full AES-256},
author = {Alex Biryukov and Dmitry Khovratovich and Ivica Nikolic},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {231--249},
doi = {10.1007/978-3-642-03356-8_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23908,
title = {The Group of Signed Quadratic Residues and Applications},
author = {Dennis Hofheinz and Eike Kiltz},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {637--653},
doi = {10.1007/978-3-642-03356-8_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23909,
title = {Cryptanalysis of C2},
author = {Julia Borghoff and Lars R. Knudsen and Gregor Leander and Krystian Matusiewicz},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {250--266},
doi = {10.1007/978-3-642-03356-8_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23910,
title = {Private Mutual Authentication and Conditional Oblivious Transfer},
author = {Stanislaw Jarecki and Xiaomin Liu},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {90--107},
doi = {10.1007/978-3-642-03356-8_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23911,
title = {Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures},
author = {Jean-S\'ebastien Coron and David Naccache and Mehdi Tibouchi and Ralf-Philipp Weinmann},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {428--444},
doi = {10.1007/978-3-642-03356-8_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23912,
title = {Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1},
author = {Kazumaro Aoki and Yu Sasaki},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {70--89},
doi = {10.1007/978-3-642-03356-8_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23913,
title = {Linear Algebra with Sub-linear Zero-Knowledge Arguments},
author = {Jens Groth},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {192--208},
doi = {10.1007/978-3-642-03356-8_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23914,
title = {Privacy-Enhancing Auctions Using Rational Cryptography},
author = {Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {541--558},
doi = {10.1007/978-3-642-03356-8_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23915,
title = {On the Amortized Complexity of Zero-Knowledge Protocols},
author = {Ronald Cramer and Ivan Damg\r ard},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {177--191},
doi = {10.1007/978-3-642-03356-8_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23916,
title = {Message Authentication Codes from Unpredictable Block Ciphers},
author = {Yevgeniy Dodis and John P. Steinberger},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {267--285},
doi = {10.1007/978-3-642-03356-8_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23917,
title = {How to Hash into Elliptic Curves},
author = {Thomas Icart},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {303--316},
doi = {10.1007/978-3-642-03356-8_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23918,
title = {Position Based Cryptography},
author = {Nishanth Chandran and Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {391--407},
doi = {10.1007/978-3-642-03356-8_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23919,
title = {Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems},
author = {Benny Applebaum and David Cash and Chris Peikert and Amit Sahai},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {595--618},
doi = {10.1007/978-3-642-03356-8_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23920,
title = {Collusion-Free Multiparty Computation in the Mediated Model},
author = {Jo\"el Alwen and Jonathan Katz and Yehuda Lindell and Giuseppe Persiano and Abhi Shelat and Ivan Visconti},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {524--540},
doi = {10.1007/978-3-642-03356-8_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23921,
title = {Utility Dependence in Correct and Fair Rational Secret Sharing},
author = {Gilad Asharov and Yehuda Lindell},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {559--576},
doi = {10.1007/978-3-642-03356-8_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{crypto-2009-23922,
title = {Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer},
author = {Juan A. Garay and Daniel Wichs and Hong-Sheng Zhou},
booktitle = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference},
volume = {5677},
pages = {505--523},
doi = {10.1007/978-3-642-03356-8_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@proceedings{crypto-2009-23719,
title = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings},
author = {Shai Halevi},
booktitle = {CRYPTO},
volume = {5677},
url = {http://link.springer.com/book/10.1007/978-3-642-03356-8},
doi = {10.1007/978-3-642-03356-8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23808,
title = {Practical Chosen Ciphertext Secure Encryption from Factoring},
author = {Dennis Hofheinz and Eike Kiltz},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {313--332},
doi = {10.1007/978-3-642-01001-9_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23809,
title = {Key Agreement from Close Secrets over Unsecured Channels},
author = {Bhavana Kanukurthi and Leonid Reyzin},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {206--223},
doi = {10.1007/978-3-642-01001-9_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23810,
title = {Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields},
author = {Takakazu Satoh},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {536--553},
doi = {10.1007/978-3-642-01001-9_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23811,
title = {Verifiable Random Functions from Identity-Based Key Encapsulation},
author = {Michel Abdalla and Dario Catalano and Dario Fiore},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {554--571},
doi = {10.1007/978-3-642-01001-9_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23812,
title = {Double-Base Number System for Multi-scalar Multiplications},
author = {Christophe Doche and David R. Kohel and Francesco Sica},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {502--517},
doi = {10.1007/978-3-642-01001-9_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23813,
title = {Cube Attacks on Tweakable Black Box Polynomials},
author = {Itai Dinur and Adi Shamir},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {278--299},
doi = {10.1007/978-3-642-01001-9_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23814,
title = {A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks},
author = {Fran\c cois-Xavier Standaert and Tal Malkin and Moti Yung},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {443--461},
doi = {10.1007/978-3-642-01001-9_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23815,
title = {Optimal Randomness Extraction from a Diffie-Hellman Element},
author = {C\'eline Chevalier and Pierre-Alain Fouque and David Pointcheval and S\'ebastien Zimmer},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {572--589},
doi = {10.1007/978-3-642-01001-9_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23816,
title = {Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening},
author = {Mihir Bellare and Dennis Hofheinz and Scott Yilek},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {1--35},
doi = {10.1007/978-3-642-01001-9_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23783,
title = {On the Security Loss in Cryptographic Reductions},
author = {Chi-Jen Lu},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {72--87},
doi = {10.1007/978-3-642-01001-9_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23784,
title = {A Leakage-Resilient Mode of Operation},
author = {Krzysztof Pietrzak},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {462--482},
doi = {10.1007/978-3-642-01001-9_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23785,
title = {Cryptography without (Hardly Any) Secrets ?},
author = {Shafi Goldwasser},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {369--370},
doi = {10.1007/978-3-642-01001-9_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23786,
title = {Order-Preserving Symmetric Encryption},
author = {Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O'Neill},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {224--241},
doi = {10.1007/978-3-642-01001-9_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23787,
title = {Cryptanalysis of MDC-2},
author = {Lars R. Knudsen and Florian Mendel and Christian Rechberger and S\oren S. Thomsen},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {106--120},
doi = {10.1007/978-3-642-01001-9_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23788,
title = {ECM on Graphics Cards},
author = {Daniel J. Bernstein and Tien-Ren Chen and Chen-Mou Cheng and Tanja Lange and Bo-Yin Yang},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {483--501},
doi = {10.1007/978-3-642-01001-9_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23789,
title = {Realizing Hash-and-Sign Signatures under Standard Assumptions},
author = {Susan Hohenberger and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {333--350},
doi = {10.1007/978-3-642-01001-9_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23790,
title = {Resettably Secure Computation},
author = {Vipul Goyal and Amit Sahai},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {54--71},
doi = {10.1007/978-3-642-01001-9_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23791,
title = {Asymmetric Group Key Agreement},
author = {Qianhong Wu and Yi Mu and Willy Susilo and Bo Qin and Josep Domingo-Ferrer},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {153--170},
doi = {10.1007/978-3-642-01001-9_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23792,
title = {Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)},
author = {Craig Gentry and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {171--188},
doi = {10.1007/978-3-642-01001-9_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23793,
title = {Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC},
author = {Xiaoyun Wang and Hongbo Yu and Wei Wang and Haina Zhang and Tao Zhan},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {121--133},
doi = {10.1007/978-3-642-01001-9_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23794,
title = {On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis},
author = {Guilhem Castagnos and Fabien Laguillaumie},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {260--277},
doi = {10.1007/978-3-642-01001-9_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23795,
title = {Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves},
author = {Steven D. Galbraith and Xibin Lin and Michael Scott},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {518--535},
doi = {10.1007/978-3-642-01001-9_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23796,
title = {Finding Preimages in Full MD5 Faster Than Exhaustive Search},
author = {Yu Sasaki and Kazumaro Aoki},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {134--152},
doi = {10.1007/978-3-642-01001-9_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23797,
title = {Breaking RSA Generically Is Equivalent to Factoring},
author = {Divesh Aggarwal and Ueli M. Maurer},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {36--53},
doi = {10.1007/978-3-642-01001-9_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23798,
title = {On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model},
author = {Eike Kiltz and Krzysztof Pietrzak},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {389--406},
doi = {10.1007/978-3-642-01001-9_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23799,
title = {Smashing SQUASH-0},
author = {Khaled Ouafi and Serge Vaudenay},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {300--312},
doi = {10.1007/978-3-642-01001-9_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23800,
title = {Salvaging Merkle-Damg\r ard for Practical Applications},
author = {Yevgeniy Dodis and Thomas Ristenpart and Thomas Shrimpton},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {371--388},
doi = {10.1007/978-3-642-01001-9_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23801,
title = {Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme},
author = {Mihir Bellare and Thomas Ristenpart},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {407--424},
doi = {10.1007/978-3-642-01001-9_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23802,
title = {A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks},
author = {Jan Camenisch and Nishanth Chandran and Victor Shoup},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {351--368},
doi = {10.1007/978-3-642-01001-9_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23803,
title = {A New Randomness Extraction Paradigm for Hybrid Encryption},
author = {Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {590--609},
doi = {10.1007/978-3-642-01001-9_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23804,
title = {On the Portability of Generalized Schnorr Proofs},
author = {Jan Camenisch and Aggelos Kiayias and Moti Yung},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {425--442},
doi = {10.1007/978-3-642-01001-9_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23805,
title = {A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier},
author = {Kan Yasuda},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {242--259},
doi = {10.1007/978-3-642-01001-9_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23806,
title = {Traitors Collaborating in Public: Pirates 2.0},
author = {Olivier Billet and Duong Hieu Phan},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {189--205},
doi = {10.1007/978-3-642-01001-9_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{eurocrypt-2009-23807,
title = {On Randomizing Hash Functions to Strengthen the Security of Digital Signatures},
author = {Praveen Gauravaram and Lars R. Knudsen},
booktitle = {Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {5479},
pages = {88--105},
doi = {10.1007/978-3-642-01001-9_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@proceedings{fse-2009-23726,
title = {Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
author = {Orr Dunkelman},
booktitle = {FSE},
volume = {5665},
url = {http://link.springer.com/book/10.1007/978-3-642-03317-9},
doi = {10.1007/978-3-642-03317-9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24026,
title = {Key Collisions of the RC4 Stream Cipher},
author = {Mitsuru Matsui},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {38--50},
doi = {10.1007/978-3-642-03317-9_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24027,
title = {Fast and Secure CBC-Type MAC Algorithms},
author = {Mridul Nandi},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {375--393},
doi = {10.1007/978-3-642-03317-9_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24028,
title = {Meet-in-the-Middle Attacks on SHA-3 Candidates},
author = {Dmitry Khovratovich and Ivica Nikolic and Ralf-Philipp Weinmann},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {228--245},
doi = {10.1007/978-3-642-03317-9_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24029,
title = {Cryptanalysis of RadioGat\'un},
author = {Thomas Fuhr and Thomas Peyrin},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {122--138},
doi = {10.1007/978-3-642-03317-9_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24030,
title = {New Cryptanalysis of Block Ciphers with Low Algebraic Degree},
author = {Bing Sun and Longjiang Qu and Chao Li},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {180--192},
doi = {10.1007/978-3-642-03317-9_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24031,
title = {Algebraic Techniques in Differential Cryptanalysis},
author = {Martin Albrecht and Carlos Cid},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {193--208},
doi = {10.1007/978-3-642-03317-9_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24039,
title = {MAC Reforgeability},
author = {John Black and Martin Cochran},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {345--362},
doi = {10.1007/978-3-642-03317-9_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24040,
title = {Revisiting the IDEA Philosophy},
author = {Pascal Junod and Marco Macchetti},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {277--295},
doi = {10.1007/978-3-642-03317-9_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24041,
title = {Practical Collisions for EnRUPT},
author = {Sebastiaan Indesteege and Bart Preneel},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {246--259},
doi = {10.1007/978-3-642-03317-9_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24042,
title = {Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6},
author = {Yevgeniy Dodis and Leonid Reyzin and Ronald L. Rivest and Emily Shen},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {104--121},
doi = {10.1007/978-3-642-03317-9_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24043,
title = {Intel's New AES Instructions for Enhanced Performance and Security},
author = {Shay Gueron},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {51--66},
doi = {10.1007/978-3-642-03317-9_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24044,
title = {On the Security of Tandem-DM},
author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {84--103},
doi = {10.1007/978-3-642-03317-9_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24045,
title = {HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption},
author = {Tetsu Iwata and Kan Yasuda},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {394--415},
doi = {10.1007/978-3-642-03317-9_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24046,
title = {Multidimensional Extension of Matsui's Algorithm 2},
author = {Miia Hermelin and Joo Yeon Cho and Kaisa Nyberg},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {209--227},
doi = {10.1007/978-3-642-03317-9_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24047,
title = {An Efficient State Recovery Attack on X-FCSR-256},
author = {Paul Stankovski and Martin Hell and Thomas Johansson},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {23--37},
doi = {10.1007/978-3-642-03317-9_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24055,
title = {Beyond-Birthday-Bound Security Based on Tweakable Block Cipher},
author = {Kazuhiko Minematsu},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {308--326},
doi = {10.1007/978-3-642-03317-9_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24056,
title = {The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr\ostl},
author = {Florian Mendel and Christian Rechberger and Martin Schl\"affer and S\oren S. Thomsen},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {260--276},
doi = {10.1007/978-3-642-03317-9_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24057,
title = {New Distinguishing Attack on MAC Using Secret-Prefix Method},
author = {Xiaoyun Wang and Wei Wang and Keting Jia and Meiqin Wang},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {363--374},
doi = {10.1007/978-3-642-03317-9_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24058,
title = {Enhanced Target Collision Resistant Hash Functions Revisited},
author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {327--344},
doi = {10.1007/978-3-642-03317-9_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24059,
title = {Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium},
author = {Jean-Philippe Aumasson and Itai Dinur and Willi Meier and Adi Shamir},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {1--22},
doi = {10.1007/978-3-642-03317-9_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24060,
title = {Preimage Attacks on Reduced Tiger and SHA-2},
author = {Takanori Isobe and Kyoji Shibutani},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {139--155},
doi = {10.1007/978-3-642-03317-9_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24061,
title = {Blockcipher-Based Hashing Revisited},
author = {Martijn Stam},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {67--83},
doi = {10.1007/978-3-642-03317-9_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24062,
title = {Cryptanalysis of the LAKE Hash Family},
author = {Alex Biryukov and Praveen Gauravaram and Jian Guo and Dmitry Khovratovich and San Ling and Krystian Matusiewicz and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {156--179},
doi = {10.1007/978-3-642-03317-9_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{fse-2009-24063,
title = {Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)},
author = {Jean-Philippe Aumasson and Jorge Nakahara Jr. and Pouyan Sepehrdad},
booktitle = {Fast Software Encryption, 16th International Workshop, FSE 2009},
volume = {5665},
pages = {296--307},
doi = {10.1007/978-3-642-03317-9_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@article{jofc-2009-23456,
title = {Security Proofs for Identity-Based Identification and Signature Schemes},
author = {Mihir Bellare and Chanathip Namprempre and Gregory Neven},
journal = {J. Cryptology},
volume = {22},
pages = {1--61},
doi = {10.1007/s00145-008-9028-8},
year = {2009}
}
@article{jofc-2009-23457,
title = {A Public Key Cryptosystem Based on Non-abelian Finite Groups},
author = {Wolfgang Lempken and Spyros S. Magliveras and Tran van Trung and Wandi Wei},
journal = {J. Cryptology},
volume = {22},
pages = {62--74},
doi = {10.1007/s00145-008-9033-y},
year = {2009}
}
@article{jofc-2009-23458,
title = {Reducing Complexity Assumptions for Statistically-Hiding Commitment},
author = {Iftach Haitner and Omer Horvitz and Jonathan Katz and Chiu-Yuen Koo and Ruggero Morselli and Ronen Shaltiel},
journal = {J. Cryptology},
volume = {22},
pages = {283--310},
doi = {10.1007/s00145-007-9012-8},
year = {2009}
}
@article{jofc-2009-23459,
title = {Non-interactive Timestamping in the Bounded-Storage Model},
author = {Tal Moran and Ronen Shaltiel and Amnon Ta-Shma},
journal = {J. Cryptology},
volume = {22},
pages = {189--226},
doi = {10.1007/s00145-008-9035-9},
year = {2009}
}
@article{jofc-2009-23460,
title = {A Proof of Security of Yao's Protocol for Two-Party Computation},
author = {Yehuda Lindell and Benny Pinkas},
journal = {J. Cryptology},
volume = {22},
pages = {161--188},
doi = {10.1007/s00145-008-9036-8},
year = {2009}
}
@article{jofc-2009-23461,
title = {Chernoff-Type Direct Product Theorems},
author = {Russell Impagliazzo and Ragesh Jaiswal and Valentine Kabanets},
journal = {J. Cryptology},
volume = {22},
pages = {75--92},
doi = {10.1007/s00145-008-9029-7},
year = {2009}
}
@article{jofc-2009-23462,
title = {Using Abelian Varieties to Improve Pairing-Based Cryptography},
author = {Karl Rubin and Alice Silverberg},
journal = {J. Cryptology},
volume = {22},
pages = {330--364},
doi = {10.1007/s00145-008-9022-1},
year = {2009}
}
@article{jofc-2009-23463,
title = {Cryptographic Hash Functions from Expander Graphs},
author = {Denis Xavier Charles and Eyal Z. Goren and Kristin E. Lauter},
journal = {J. Cryptology},
volume = {22},
pages = {93--113},
doi = {10.1007/s00145-007-9002-x},
year = {2009}
}
@article{jofc-2009-23464,
title = {Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures},
author = {Phong Q. Nguyen and Oded Regev},
journal = {J. Cryptology},
volume = {22},
pages = {139--160},
doi = {10.1007/s00145-008-9031-0},
year = {2009}
}
@article{jofc-2009-23465,
title = {Multipartite Secret Sharing by Bivariate Interpolation},
author = {Nira Dyn and Tamir Tassa},
journal = {J. Cryptology},
volume = {22},
pages = {227--258},
doi = {10.1007/s00145-008-9027-9},
year = {2009}
}
@article{jofc-2009-23466,
title = {Upper and Lower Bounds on Black-Box Steganography},
author = {Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell},
journal = {J. Cryptology},
volume = {22},
pages = {365--394},
doi = {10.1007/s00145-008-9020-3},
year = {2009}
}
@article{jofc-2009-23467,
title = {Ring Signatures: Stronger Definitions, and Constructions without Random Oracles},
author = {Adam Bender and Jonathan Katz and Ruggero Morselli},
journal = {J. Cryptology},
volume = {22},
pages = {114--138},
doi = {10.1007/s00145-007-9011-9},
year = {2009}
}
@article{jofc-2009-23468,
title = {General Composition and Universal Composability in Secure Multiparty Computation},
author = {Yehuda Lindell},
journal = {J. Cryptology},
volume = {22},
pages = {395--428},
doi = {10.1007/s00145-008-9021-2},
year = {2009}
}
@article{jofc-2009-23469,
title = {Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography},
author = {Manuel Barbosa and Andrew Moss and Dan Page},
journal = {J. Cryptology},
volume = {22},
pages = {259--281},
doi = {10.1007/s00145-008-9023-0},
year = {2009}
}
@article{jofc-2009-23470,
title = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions},
author = {John Black and Martin Cochran and Thomas Shrimpton},
journal = {J. Cryptology},
volume = {22},
pages = {311--329},
doi = {10.1007/s00145-008-9030-1},
year = {2009}
}
@article{jofc-2009-23471,
title = {Efficient Non-malleable Commitment Schemes},
author = {Roger Fischlin and Marc Fischlin},
journal = {J. Cryptology},
volume = {22},
pages = {530--571},
doi = {10.1007/s00145-009-9045-2},
year = {2009}
}
@article{jofc-2009-23472,
title = {Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves^{, }},
author = {Benjamin Smith},
journal = {J. Cryptology},
volume = {22},
pages = {505--529},
doi = {10.1007/s00145-009-9038-1},
year = {2009}
}
@article{jofc-2009-23473,
title = {The Twin Diffie-Hellman Problem and Applications},
author = {David Cash and Eike Kiltz and Victor Shoup},
journal = {J. Cryptology},
volume = {22},
pages = {470--504},
doi = {10.1007/s00145-009-9041-6},
year = {2009}
}
@article{jofc-2009-23474,
title = {New Approaches for Deniable Authentication},
author = {Rosario Gennaro and Mario Di Raimondo},
journal = {J. Cryptology},
volume = {22},
pages = {572--615},
doi = {10.1007/s00145-009-9044-3},
year = {2009}
}
@article{jofc-2009-23475,
title = {Cryptography with Constant Input Locality},
author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz},
journal = {J. Cryptology},
volume = {22},
pages = {429--469},
doi = {10.1007/s00145-009-9039-0},
year = {2009}
}
@proceedings{pkc-2009-18704,
title = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
booktitle = {PKC},
volume = {5443},
url = {http://link.springer.com/book/10.1007/978-3-642-00468-1},
doi = {10.1007/978-3-642-00468-1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18705,
title = {Distributed Public-Key Cryptography from Weak Secrets},
author = {Michel Abdalla and Xavier Boyen and C\'eline Chevalier and David Pointcheval},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {139--159},
doi = {10.1007/978-3-642-00468-1_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18706,
title = {Compact CCA-Secure Encryption for Messages of Arbitrary Length},
author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {377--392},
doi = {10.1007/978-3-642-00468-1_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18707,
title = {An Algebraic Surface Cryptosystem},
author = {Koichiro Akiyama and Yasuhiro Goto and Hideyuki Miyake},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {425--442},
doi = {10.1007/978-3-642-00468-1_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18708,
title = {A New Lattice Construction for Partial Key Exposure Attack for RSA},
author = {Yoshinori Aono},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {34--53},
doi = {10.1007/978-3-642-00468-1_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18709,
title = {Signing a Linear Subspace: Signature Schemes for Network Coding},
author = {Dan Boneh and David Freeman and Jonathan Katz and Brent Waters},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {68--87},
doi = {10.1007/978-3-642-00468-1_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18710,
title = {Security of Sanitizable Signatures Revisited},
author = {Christina Brzuska and Marc Fischlin and Tobias Freudenreich and Anja Lehmann and Marcus Page and Jakob Schelbert and Dominique Schr\"oder and Florian Volk},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {317--336},
doi = {10.1007/978-3-642-00468-1_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18711,
title = {Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data},
author = {Jan Camenisch and Markulf Kohlweiss and Alfredo Rial and Caroline Sheedy},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {196--214},
doi = {10.1007/978-3-642-00468-1_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18712,
title = {An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials},
author = {Jan Camenisch and Markulf Kohlweiss and Claudio Soriente},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {481--500},
doi = {10.1007/978-3-642-00468-1_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18713,
title = {Removing Escrow from Identity-Based Encryption},
author = {Sherman S. M. Chow},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {256--276},
doi = {10.1007/978-3-642-00468-1_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18714,
title = {Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials},
author = {Scott E. Coull and Matthew Green and Susan Hohenberger},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {501--520},
doi = {10.1007/978-3-642-00468-1_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18715,
title = {Asynchronous Multiparty Computation: Theory and Implementation},
author = {Ivan Damg\r ard and Martin Geisler and Mikkel Kr\oigaard and Jesper Buus Nielsen},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {160--179},
doi = {10.1007/978-3-642-00468-1_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18716,
title = {On the Theory and Practice of Personal Digital Signatures},
author = {Ivan Damg\r ard and Gert L\aess\oe Mikkelsen},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {277--296},
doi = {10.1007/978-3-642-00468-1_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18717,
title = {Security of Blind Signatures under Aborts},
author = {Marc Fischlin and Dominique Schr\"oder},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {297--316},
doi = {10.1007/978-3-642-00468-1_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18718,
title = {Multi-Party Computation with Omnipresent Adversary},
author = {Hossein Ghodosi and Josef Pieprzyk},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {180--195},
doi = {10.1007/978-3-642-00468-1_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18719,
title = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols},
author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {105--123},
doi = {10.1007/978-3-642-00468-1_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18720,
title = {A Practical Key Recovery Attack on Basic TCHo},
author = {Mathias Herrmann and Gregor Leander},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {411--424},
doi = {10.1007/978-3-642-00468-1_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18721,
title = {Verifiable Rotation of Homomorphic Encryptions},
author = {Sebastiaan de Hoogh and Berry Schoenmakers and Boris Skoric and Jos\'e Villegas},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {393--410},
doi = {10.1007/978-3-642-00468-1_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18722,
title = {Improving the Boneh-Franklin Traitor Tracing Scheme},
author = {Pascal Junod and Alexandre Karlov and Arjen K. Lenstra},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {88--104},
doi = {10.1007/978-3-642-00468-1_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18723,
title = {Zero-Knowledge Proofs with Witness Elimination},
author = {Aggelos Kiayias and Hong-Sheng Zhou},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {124--138},
doi = {10.1007/978-3-642-00468-1_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18724,
title = {Subset-Restricted Random Walks for Pollard rho Method on F_{pm}},
author = {Minkyu Kim and Jung Hee Cheon and Jin Hong},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {54--67},
doi = {10.1007/978-3-642-00468-1_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18725,
title = {Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys},
author = {Beno\^\it Libert and Damien Vergnaud},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {235--255},
doi = {10.1007/978-3-642-00468-1_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18726,
title = {Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication},
author = {Patrick Longa and Catherine H. Gebotys},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {443--462},
doi = {10.1007/978-3-642-00468-1_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18727,
title = {Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures},
author = {Brian J. Matt},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {337--356},
doi = {10.1007/978-3-642-00468-1_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18728,
title = {Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint},
author = {Alexander May and Maike Ritzenhofen},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {1--14},
doi = {10.1007/978-3-642-00468-1_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18729,
title = {The Security of All Bits Using List Decoding},
author = {Paz Morillo and Carla R\`afols},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {15--33},
doi = {10.1007/978-3-642-00468-1_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18730,
title = {Revocable Group Signature Schemes with Constant Costs for Signing and Verifying},
author = {Toru Nakanishi and Hiroki Fujii and Yuta Hira and Nobuo Funabiki},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {463--480},
doi = {10.1007/978-3-642-00468-1_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18731,
title = {Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts},
author = {Jae Hong Seo and Tetsutaro Kobayashi and Miyako Ohkubo and Koutarou Suzuki},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {215--234},
doi = {10.1007/978-3-642-00468-1_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{pkc-2009-18732,
title = {CCA-Secure Proxy Re-encryption without Pairings},
author = {Jun Shao and Zhenfu Cao},
booktitle = {Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings},
volume = {5443},
pages = {357--376},
doi = {10.1007/978-3-642-00468-1_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@proceedings{tcc-2009-18388,
title = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
booktitle = {TCC},
volume = {5444},
url = {http://link.springer.com/book/10.1007/978-3-642-00457-5},
doi = {10.1007/978-3-642-00457-5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18390,
title = {LEGO for Two-Party Secure Computation},
author = {Jesper Buus Nielsen and Claudio Orlandi},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {368--386},
doi = {10.1007/978-3-642-00457-5_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18391,
title = {Authenticated Adversarial Routing},
author = {Yair Amir and Paul Bunn and Rafail Ostrovsky},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {163--182},
doi = {10.1007/978-3-642-00457-5_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18392,
title = {Universally Composable Multiparty Computation with Partially Isolated Parties},
author = {Ivan Damg\r ard and Jesper Buus Nielsen and Daniel Wichs},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {315--331},
doi = {10.1007/978-3-642-00457-5_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18393,
title = {Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation},
author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {256--273},
doi = {10.1007/978-3-642-00457-5_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18394,
title = {Simulation-Based Concurrent Non-malleable Commitments and Decommitments},
author = {Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {91--108},
doi = {10.1007/978-3-642-00457-5_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18395,
title = {Secure Arithmetic Computation with No Honest Majority},
author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {294--314},
doi = {10.1007/978-3-642-00457-5_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18396,
title = {Some Recent Progress in Lattice-Based Cryptography},
author = {Chris Peikert},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {72},
doi = {10.1007/978-3-642-00457-5_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18397,
title = {How Efficient Can Memory Checking Be?},
author = {Cynthia Dwork and Moni Naor and Guy N. Rothblum and Vinod Vaikuntanathan},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {503--520},
doi = {10.1007/978-3-642-00457-5_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18398,
title = {Composability and On-Line Deniability of Authentication},
author = {Yevgeniy Dodis and Jonathan Katz and Adam Smith and Shabsi Walfish},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {146--162},
doi = {10.1007/978-3-642-00457-5_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18399,
title = {Oblivious Transfer from Weak Noisy Channels},
author = {J\"urg Wullschleger},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {332--349},
doi = {10.1007/978-3-642-00457-5_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18400,
title = {Towards a Theory of Extractable Functions},
author = {Ran Canetti and Ronny Ramzi Dakdouk},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {595--613},
doi = {10.1007/978-3-642-00457-5_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18401,
title = {Composing Quantum Protocols in a Classical Environment},
author = {Serge Fehr and Christian Schaffner},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {350--367},
doi = {10.1007/978-3-642-00457-5_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18402,
title = {An Optimally Fair Coin Toss},
author = {Tal Moran and Moni Naor and Gil Segev},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {1--18},
doi = {10.1007/978-3-642-00457-5_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18403,
title = {Simultaneous Hardcore Bits and Cryptography against Memory Attacks},
author = {Adi Akavia and Shafi Goldwasser and Vinod Vaikuntanathan},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {474--495},
doi = {10.1007/978-3-642-00457-5_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18404,
title = {Non-malleable Obfuscation},
author = {Ran Canetti and Mayank Varia},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {73--90},
doi = {10.1007/978-3-642-00457-5_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18405,
title = {Fairness with an Honest Minority and a Rational Majority},
author = {Shien Jin Ong and David C. Parkes and Alon Rosen and Salil P. Vadhan},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {36--53},
doi = {10.1007/978-3-642-00457-5_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18406,
title = {On the (Im)Possibility of Key Dependent Encryption},
author = {Iftach Haitner and Thomas Holenstein},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {202--219},
doi = {10.1007/978-3-642-00457-5_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18407,
title = {Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security},
author = {Robin K\"unzler and J\"orn M\"uller-Quade and Dominik Raub},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {238--255},
doi = {10.1007/978-3-642-00457-5_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18408,
title = {Hierarchical Identity Based Encryption with Polynomially Many Levels},
author = {Craig Gentry and Shai Halevi},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {437--456},
doi = {10.1007/978-3-642-00457-5_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18409,
title = {Secret Sharing and Non-Shannon Information Inequalities},
author = {Amos Beimel and Ilan Orlov},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {539--557},
doi = {10.1007/978-3-642-00457-5_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18410,
title = {Weak Verifiable Random Functions},
author = {Zvika Brakerski and Shafi Goldwasser and Guy N. Rothblum and Vinod Vaikuntanathan},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {558--576},
doi = {10.1007/978-3-642-00457-5_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18411,
title = {Security Amplification for InteractiveCryptographic Primitives},
author = {Yevgeniy Dodis and Russell Impagliazzo and Ragesh Jaiswal and Valentine Kabanets},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {128--145},
doi = {10.1007/978-3-642-00457-5_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18412,
title = {Predicate Privacy in Encryption Systems},
author = {Emily Shen and Elaine Shi and Brent Waters},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {457--473},
doi = {10.1007/978-3-642-00457-5_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18413,
title = {Purely Rational Secret Sharing (Extended Abstract)},
author = {Silvio Micali and Abhi Shelat},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {54--71},
doi = {10.1007/978-3-642-00457-5_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18414,
title = {On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols},
author = {Iftach Haitner and Alon Rosen and Ronen Shaltiel},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {220--237},
doi = {10.1007/978-3-642-00457-5_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18415,
title = {Proofs of Retrievability via Hardness Amplification},
author = {Yevgeniy Dodis and Salil P. Vadhan and Daniel Wichs},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {109--127},
doi = {10.1007/978-3-642-00457-5_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18416,
title = {Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer},
author = {Yehuda Lindell and Hila Zarosim},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {183--201},
doi = {10.1007/978-3-642-00457-5_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18417,
title = {Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection},
author = {Stanislaw Jarecki and Xiaomin Liu},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {577--594},
doi = {10.1007/978-3-642-00457-5_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18418,
title = {Simple, Black-Box Constructions of Adaptively Secure Protocols},
author = {Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {387--402},
doi = {10.1007/978-3-642-00457-5_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18419,
title = {Black-Box Constructions of Two-Party Protocols from One-Way Functions},
author = {Rafael Pass and Hoeteck Wee},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {403--418},
doi = {10.1007/978-3-642-00457-5_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18420,
title = {Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms},
author = {James Cook and Omid Etesami and Rachel Miller and Luca Trevisan},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {521--538},
doi = {10.1007/978-3-642-00457-5_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18421,
title = {Complete Fairness in Multi-party Computation without an Honest Majority},
author = {S. Dov Gordon and Jonathan Katz},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {19--35},
doi = {10.1007/978-3-642-00457-5_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18422,
title = {Realistic Failures in Secure Multi-party Computation},
author = {Vassilis Zikas and Sarah Hauser and Ueli M. Maurer},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {274--293},
doi = {10.1007/978-3-642-00457-5_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18423,
title = {The Differential Privacy Frontier (Extended Abstract)},
author = {Cynthia Dwork},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {496--502},
doi = {10.1007/978-3-642-00457-5_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{tcc-2009-18424,
title = {Chosen-Ciphertext Security via Correlated Products},
author = {Alon Rosen and Gil Segev},
booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
volume = {5444},
pages = {419--436},
doi = {10.1007/978-3-642-00457-5_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2009}
}
@inproceedings{asiacrypt-2008-18286,
title = {An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity},
author = {Claude Carlet and Keqin Feng},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {425--440},
doi = {10.1007/978-3-540-89255-7_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@proceedings{asiacrypt-2008-18287,
title = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
booktitle = {ASIACRYPT},
volume = {5350},
url = {http://link.springer.com/book/10.1007/978-3-540-89255-7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18288,
title = {On the Security of HB\# against a Man-in-the-Middle Attack},
author = {Khaled Ouafi and Raphael Overbeck and Serge Vaudenay},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {108--124},
doi = {10.1007/978-3-540-89255-7_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18289,
title = {Twisted Edwards Curves Revisited},
author = {H\"useyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {326--343},
doi = {10.1007/978-3-540-89255-7_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18290,
title = {Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits},
author = {Mathias Herrmann and Alexander May},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {406--424},
doi = {10.1007/978-3-540-89255-7_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18291,
title = {Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes},
author = {Zhifang Zhang and Mulan Liu and Yeow Meng Chee and San Ling and Huaxiong Wang},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {19--36},
doi = {10.1007/978-3-540-89255-7_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18292,
title = {Breaking the F-FCSR-H Stream Cipher in Real Time},
author = {Martin Hell and Thomas Johansson},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {557--569},
doi = {10.1007/978-3-540-89255-7_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18293,
title = {On the Validity of the phi-Hiding Assumption in Cryptographic Protocols},
author = {Christian Schridde and Bernd Freisleben},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {344--354},
doi = {10.1007/978-3-540-89255-7_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18294,
title = {A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting},
author = {Jason Keller and Joe Kilian},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {198--215},
doi = {10.1007/978-3-540-89255-7_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18295,
title = {MPC vs. SFE : Unconditional and Computational Security},
author = {Martin Hirt and Ueli M. Maurer and Vassilis Zikas},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {1--18},
doi = {10.1007/978-3-540-89255-7_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18296,
title = {OAEP Is Secure under Key-Dependent Messages},
author = {Michael Backes and Markus D\"urmuth and Dominique Unruh},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {506--523},
doi = {10.1007/978-3-540-89255-7_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18297,
title = {Some Perspectives on Complexity-Based Cryptography},
author = {Andrew Chi-Chih Yao},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {54},
doi = {10.1007/978-3-540-89255-7_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18298,
title = {Ambiguous Optimistic Fair Exchange},
author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {74--89},
doi = {10.1007/978-3-540-89255-7_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18299,
title = {Compact Proofs of Retrievability},
author = {Hovav Shacham and Brent Waters},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {90--107},
doi = {10.1007/978-3-540-89255-7_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18300,
title = {Preimage Attacks on 3, 4, and 5-Pass HAVAL},
author = {Yu Sasaki and Kazumaro Aoki},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {253--271},
doi = {10.1007/978-3-540-89255-7_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18301,
title = {Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems},
author = {Andy Rupp and Gregor Leander and Endre Bangerter and Alexander W. Dent and Ahmad-Reza Sadeghi},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {489--505},
doi = {10.1007/978-3-540-89255-7_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18302,
title = {Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks},
author = {Jung-Keun Lee and Dong Hoon Lee 0002 and Sangwoo Park},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {524--538},
doi = {10.1007/978-3-540-89255-7_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18303,
title = {Graph Design for Secure Multiparty Computation over Non-Abelian Groups},
author = {Xiaoming Sun and Andrew Chi-Chih Yao and Christophe Tartary},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {37--53},
doi = {10.1007/978-3-540-89255-7_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18304,
title = {A New Attack on the LEX Stream Cipher},
author = {Orr Dunkelman and Nathan Keller},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {539--556},
doi = {10.1007/978-3-540-89255-7_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18305,
title = {How to Fill Up Merkle-Damg\r ard Hash Functions},
author = {Kan Yasuda},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {272--289},
doi = {10.1007/978-3-540-89255-7_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18306,
title = {Speeding Up the Pollard Rho Method on Prime Fields},
author = {Jung Hee Cheon and Jin Hong and Minkyu Kim},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {471--488},
doi = {10.1007/978-3-540-89255-7_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18307,
title = {Efficient Protocols for Set Membership and Range Proofs},
author = {Jan Camenisch and Rafik Chaabouni and Abhi Shelat},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {234--252},
doi = {10.1007/978-3-540-89255-7_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18308,
title = {An Improved Impossible Differential Attack on MISTY1},
author = {Orr Dunkelman and Nathan Keller},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {441--454},
doi = {10.1007/978-3-540-89255-7_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18309,
title = {Rigorous and Efficient Short Lattice Vectors Enumeration},
author = {Xavier Pujol and Damien Stehl\'e},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {390--405},
doi = {10.1007/978-3-540-89255-7_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18310,
title = {Slide Attacks on a Class of Hash Functions},
author = {Michael Gorski and Stefan Lucks and Thomas Peyrin},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {143--160},
doi = {10.1007/978-3-540-89255-7_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18311,
title = {Generalized Identity Based and Broadcast Encryption Schemes},
author = {Dan Boneh and Michael Hamburg},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {455--470},
doi = {10.1007/978-3-540-89255-7_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18312,
title = {A Modular Security Analysis of the TLS Handshake Protocol},
author = {Paul Morrissey and Nigel P. Smart and Bogdan Warinschi},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {55--73},
doi = {10.1007/978-3-540-89255-7_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18313,
title = {Universally Composable Adaptive Oblivious Transfer},
author = {Matthew Green and Susan Hohenberger},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {179--197},
doi = {10.1007/978-3-540-89255-7_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18314,
title = {Chosen Ciphertext Security with Optimal Ciphertext Overhead},
author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {355--371},
doi = {10.1007/978-3-540-89255-7_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18315,
title = {Limits of Constructive Security Proofs},
author = {Michael Backes and Dominique Unruh},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {290--307},
doi = {10.1007/978-3-540-89255-7_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18316,
title = {Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems},
author = {Akinori Kawachi and Keisuke Tanaka and Keita Xagawa},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {372--389},
doi = {10.1007/978-3-540-89255-7_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18317,
title = {Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption},
author = {Goichiro Hanaoka and Kaoru Kurosawa},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {308--325},
doi = {10.1007/978-3-540-89255-7_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18318,
title = {Towards Robust Computation on Encrypted Data},
author = {Manoj Prabhakaran and Mike Rosulek},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {216--233},
doi = {10.1007/978-3-540-89255-7_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18319,
title = {Hash Functions from Sigma Protocols and Improvements to VSH},
author = {Mihir Bellare and Todor Ristov},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {125--142},
doi = {10.1007/978-3-540-89255-7_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2008-18320,
title = {Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography},
author = {Ueli M. Maurer and Stefano Tessaro},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings},
volume = {5350},
pages = {161--178},
doi = {10.1007/978-3-540-89255-7_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@proceedings{ches-2008-18321,
title = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
booktitle = {CHES},
volume = {5154},
url = {http://link.springer.com/book/10.1007/978-3-540-85053-3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18322,
title = {Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths},
author = {Colin D. Walter},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {214--227},
doi = {10.1007/978-3-540-85053-3_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18323,
title = {A Vision for Platform Security},
author = {Ernie Brickell},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {444},
doi = {10.1007/978-3-540-85053-3_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18324,
title = {Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration},
author = {Nele Mentens and Benedikt Gierlichs and Ingrid Verbauwhede},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {346--362},
doi = {10.1007/978-3-540-85053-3_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18325,
title = {Divided Backend Duplication Methodology for Balanced Dual Rail Routing},
author = {Karthik Baddam and Mark Zwolinski},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {396--410},
doi = {10.1007/978-3-540-85053-3_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18326,
title = {RFID and Its Vulnerability to Faults},
author = {Michael Hutter and J\"orn-Marc Schmidt and Thomas Plos},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {363--379},
doi = {10.1007/978-3-540-85053-3_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18327,
title = {RSA-Past, Present, Future},
author = {Adi Shamir},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {443},
doi = {10.1007/978-3-540-85053-3_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18328,
title = {Mutual Information Analysis},
author = {Benedikt Gierlichs and Lejla Batina and Pim Tuyls and Bart Preneel},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {426--442},
doi = {10.1007/978-3-540-85053-3_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18329,
title = {Fast Digital TRNG Based on Metastable Ring Oscillator},
author = {Ihor Vasyltsov and Eduard Hambardzumyan and Young-Sik Kim and Bohdan Karpinskyy},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {164--180},
doi = {10.1007/978-3-540-85053-3_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18330,
title = {A Real-World Attack Breaking A5/1 within Hours},
author = {Timo Gendrullis and Martin Novotn\'y and Andy Rupp},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {266--282},
doi = {10.1007/978-3-540-85053-3_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18331,
title = {RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks},
author = {David Vigilant},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {130--145},
doi = {10.1007/978-3-540-85053-3_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18332,
title = {A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases},
author = {Arash Reyhani-Masoleh},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {300--314},
doi = {10.1007/978-3-540-85053-3_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18333,
title = {The Carry Leakage on the Randomized Exponent Countermeasure},
author = {Pierre-Alain Fouque and Denis R\'eal and Fr\'ed\'eric Valette and M'hamed Drissi},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {198--213},
doi = {10.1007/978-3-540-85053-3_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18334,
title = {A Design for a Physical RNG with Robust Entropy Estimators},
author = {Wolfgang Killmann and Werner Schindler},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {146--163},
doi = {10.1007/978-3-540-85053-3_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18335,
title = {A Very Compact Hardware Implementation of the MISTY1 Block Cipher},
author = {Dai Yamamoto and Jun Yajima and Kouichi Itoh},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {315--330},
doi = {10.1007/978-3-540-85053-3_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18336,
title = {Hash Functions and RFID Tags: Mind the Gap},
author = {Andrey Bogdanov and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {283--299},
doi = {10.1007/978-3-540-85053-3_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18337,
title = {Efficient Helper Data Key Extractor on FPGAs},
author = {Christoph B\"osch and Jorge Guajardo and Ahmad-Reza Sadeghi and Jamshid Shokrollahi and Pim Tuyls},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {181--197},
doi = {10.1007/978-3-540-85053-3_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18338,
title = {High-Performance Concurrent Error Detection Scheme for AES Hardware},
author = {Akashi Satoh and Takeshi Sugawara and Naofumi Homma and Takafumi Aoki},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {100--112},
doi = {10.1007/978-3-540-85053-3_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18339,
title = {Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography},
author = {Philipp Grabher and Johann Gro\sssch\"adl and Dan Page},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {331--345},
doi = {10.1007/978-3-540-85053-3_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18340,
title = {Exploiting the Power of GPUs for Asymmetric Cryptography},
author = {Robert Szerwinski and Tim G\"uneysu},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {79--99},
doi = {10.1007/978-3-540-85053-3_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18341,
title = {Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?},
author = {Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp and Christopher Wolf},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {45--61},
doi = {10.1007/978-3-540-85053-3_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18342,
title = {Binary Edwards Curves},
author = {Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {244--265},
doi = {10.1007/978-3-540-85053-3_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18343,
title = {Perturbating RSA Public Keys: An Improved Attack},
author = {Alexandre Berzati and C\'ecile Canovas and Louis Goubin},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {380--395},
doi = {10.1007/978-3-540-85053-3_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18344,
title = {Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages},
author = {Fran\c cois-Xavier Standaert and C\'edric Archambeau},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {411--425},
doi = {10.1007/978-3-540-85053-3_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18345,
title = {Attacking State-of-the-Art Software Countermeasures-A Case Study for AES},
author = {Stefan Tillich and Christoph Herbst},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {228--243},
doi = {10.1007/978-3-540-85053-3_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18346,
title = {Ultra High Performance ECC over NIST Primes on Commercial FPGAs},
author = {Tim G\"uneysu and Christof Paar},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {62--78},
doi = {10.1007/978-3-540-85053-3_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18347,
title = {Multiple-Differential Side-Channel Collision Attacks on AES},
author = {Andrey Bogdanov},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {30--44},
doi = {10.1007/978-3-540-85053-3_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18348,
title = {A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis},
author = {Mehran Mozaffari Kermani and Arash Reyhani-Masoleh},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {113--129},
doi = {10.1007/978-3-540-85053-3_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18349,
title = {Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs},
author = {Naofumi Homma and Atsushi Miyamoto and Takafumi Aoki and Akashi Satoh and Adi Shamir},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {15--29},
doi = {10.1007/978-3-540-85053-3_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{ches-2008-18350,
title = {Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform},
author = {Jean-S\'ebastien Coron and Christophe Giraud and Emmanuel Prouff and Matthieu Rivain},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
volume = {5154},
pages = {1--14},
doi = {10.1007/978-3-540-85053-3_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23853,
title = {Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs},
author = {Yevgeniy Dodis and Victor Shoup and Shabsi Walfish},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {515--535},
doi = {10.1007/978-3-540-85174-5_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23854,
title = {Founding Cryptography on Oblivious Transfer - Efficiently},
author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {572--591},
doi = {10.1007/978-3-540-85174-5_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23855,
title = {Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles},
author = {Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {360--378},
doi = {10.1007/978-3-540-85174-5_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23858,
title = {Distributed Private Data Analysis: Simultaneously Solving How and What},
author = {Amos Beimel and Kobbi Nissim and Eran Omri},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {451--468},
doi = {10.1007/978-3-540-85174-5_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23862,
title = {Collusion-Free Protocols in the Mediated Model},
author = {Jo\"el Alwen and Abhi Shelat and Ivan Visconti},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {497--514},
doi = {10.1007/978-3-540-85174-5_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23863,
title = {One-Time Programs},
author = {Shafi Goldwasser and Yael Tauman Kalai and Guy N. Rothblum},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {39--56},
doi = {10.1007/978-3-540-85174-5_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23864,
title = {Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions},
author = {Martijn Stam},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {397--412},
doi = {10.1007/978-3-540-85174-5_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23865,
title = {A Framework for Efficient and Composable Oblivious Transfer},
author = {Chris Peikert and Vinod Vaikuntanathan and Brent Waters},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {554--571},
doi = {10.1007/978-3-540-85174-5_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23866,
title = {Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems},
author = {Chris Peikert and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {536--553},
doi = {10.1007/978-3-540-85174-5_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23867,
title = {Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms},
author = {Helena Handschuh and Bart Preneel},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {144--161},
doi = {10.1007/978-3-540-85174-5_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23868,
title = {Cryptanalysis of the GOST Hash Function},
author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Marcin Kontak and Janusz Szmidt},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {162--178},
doi = {10.1007/978-3-540-85174-5_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23869,
title = {New State Recovery Attack on RC4},
author = {Alexander Maximov and Dmitry Khovratovich},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {297--316},
doi = {10.1007/978-3-540-85174-5_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23870,
title = {Communication Complexity in Algebraic Two-Party Protocols},
author = {Rafail Ostrovsky and William E. Skeith III},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {379--396},
doi = {10.1007/978-3-540-85174-5_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23871,
title = {Preimages for Reduced SHA-0 and SHA-1},
author = {Christophe De Canni\`ere and Christian Rechberger},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {179--202},
doi = {10.1007/978-3-540-85174-5_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23872,
title = {Improved Bounds on Security Reductions for Discrete Log Based Signatures},
author = {Sanjam Garg and Raghav Bhaskar and Satyanarayana V. Lokam},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {93--107},
doi = {10.1007/978-3-540-85174-5_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23873,
title = {Circular-Secure Encryption from Decision Diffie-Hellman},
author = {Dan Boneh and Shai Halevi and Michael Hamburg and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {108--125},
doi = {10.1007/978-3-540-85174-5_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23874,
title = {Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers},
author = {Phillip Rogaway and John P. Steinberger},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {433--450},
doi = {10.1007/978-3-540-85174-5_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23875,
title = {Programmable Hash Functions and Their Applications},
author = {Dennis Hofheinz and Eike Kiltz},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {21--38},
doi = {10.1007/978-3-540-85174-5_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23876,
title = {Compression from Collisions, or Why CRHF Combiners Have a Long Output},
author = {Krzysztof Pietrzak},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {413--432},
doi = {10.1007/978-3-540-85174-5_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23877,
title = {New Efficient Attacks on Statistical Disclosure Control Mechanisms},
author = {Cynthia Dwork and Sergey Yekhanin},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {469--480},
doi = {10.1007/978-3-540-85174-5_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23878,
title = {On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles},
author = {Alexandra Boldyreva and Serge Fehr and Adam O'Neill},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {335--359},
doi = {10.1007/978-3-540-85174-5_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23879,
title = {Scalable Multiparty Computation with Nearly Optimal Work and Resilience},
author = {Ivan Damg\r ard and Yuval Ishai and Mikkel Kr\oigaard and Jesper Buus Nielsen and Adam Smith},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {241--261},
doi = {10.1007/978-3-540-85174-5_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23880,
title = {Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations},
author = {Manoj Prabhakaran and Mike Rosulek},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {262--279},
doi = {10.1007/978-3-540-85174-5_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23881,
title = {Public-Key Locally-Decodable Codes},
author = {Brett Hemenway and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {126--143},
doi = {10.1007/978-3-540-85174-5_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23882,
title = {Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys},
author = {Dimitar Jetchev and Ramarathnam Venkatesan},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {75--92},
doi = {10.1007/978-3-540-85174-5_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23883,
title = {Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries},
author = {Payman Mohassel and Enav Weinreb},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {481--496},
doi = {10.1007/978-3-540-85174-5_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23884,
title = {Cryptanalysis of MinRank},
author = {Jean-Charles Faug\`ere and Fran\c coise Levy-dit-Vehel and Ludovic Perret},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {280--296},
doi = {10.1007/978-3-540-85174-5_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23885,
title = {On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme},
author = {Thomas Eisenbarth and Timo Kasper and Amir Moradi and Christof Paar and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {203--220},
doi = {10.1007/978-3-540-85174-5_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23887,
title = {Adaptive One-Way Functions and Applications},
author = {Omkant Pandey and Rafael Pass and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {57--74},
doi = {10.1007/978-3-540-85174-5_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23888,
title = {The Random Oracle Model and the Ideal Cipher Model Are Equivalent},
author = {Jean-S\'ebastien Coron and Jacques Patarin and Yannick Seurin},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {1--20},
doi = {10.1007/978-3-540-85174-5_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-23892,
title = {Bug Attacks},
author = {Eli Biham and Yaniv Carmeli and Adi Shamir},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {221--240},
doi = {10.1007/978-3-540-85174-5_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@proceedings{crypto-2008-18351,
title = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings},
booktitle = {CRYPTO},
volume = {5157},
url = {http://link.springer.com/book/10.1007/978-3-540-85174-5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{crypto-2008-18361,
title = {Dynamic Threshold Public-Key Encryption},
author = {C\'ecile Delerabl\'ee and David Pointcheval},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008},
volume = {5157},
pages = {317--334},
doi = {10.1007/978-3-540-85174-5_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15535,
title = {Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle},
author = {Jens Groth and Yuval Ishai},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {379--396},
doi = {10.1007/978-3-540-78967-3_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15536,
title = {Predicting Lattice Reduction},
author = {Nicolas Gama and Phong Q. Nguyen},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {31--51},
doi = {10.1007/978-3-540-78967-3_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15537,
title = {Zero-Knowledge Sets with Short Proofs},
author = {Dario Catalano and Dario Fiore and Mariagrazia Messina},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {433--450},
doi = {10.1007/978-3-540-78967-3_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15538,
title = {Precise Concurrent Zero Knowledge},
author = {Omkant Pandey and Rafael Pass and Amit Sahai and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {397--414},
doi = {10.1007/978-3-540-78967-3_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15539,
title = {Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves},
author = {Hao Chen and Ronald Cramer and Robbert de Haan and Ignacio Cascudo Pueyo},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {451--470},
doi = {10.1007/978-3-540-78967-3_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15540,
title = {Protocols and Lower Bounds for Failure Localization in the Internet},
author = {Boaz Barak and Sharon Goldberg and David Xiao},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {341--360},
doi = {10.1007/978-3-540-78967-3_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15541,
title = {Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves},
author = {Benjamin Smith},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {163--180},
doi = {10.1007/978-3-540-78967-3_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15542,
title = {Threshold RSA for Dynamic and Ad-Hoc Groups},
author = {Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {88--107},
doi = {10.1007/978-3-540-78967-3_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15543,
title = {The Twin Diffie-Hellman Problem and Applications},
author = {David Cash and Eike Kiltz and Victor Shoup},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {127--145},
doi = {10.1007/978-3-540-78967-3_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15544,
title = {New Constructions for UC Secure Computation Using Tamper-Proof Hardware},
author = {Nishanth Chandran and Vipul Goyal and Amit Sahai},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {545--562},
doi = {10.1007/978-3-540-78967-3_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15545,
title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products},
author = {Jonathan Katz and Amit Sahai and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {146--162},
doi = {10.1007/978-3-540-78967-3_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15546,
title = {Obfuscating Point Functions with Multibit Output},
author = {Ran Canetti and Ronny Ramzi Dakdouk},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {489--508},
doi = {10.1007/978-3-540-78967-3_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15547,
title = {Efficient Non-interactive Proof Systems for Bilinear Groups},
author = {Jens Groth and Amit Sahai},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {415--432},
doi = {10.1007/978-3-540-78967-3_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15548,
title = {Almost-Everywhere Secure Computation},
author = {Juan A. Garay and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {307--323},
doi = {10.1007/978-3-540-78967-3_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15549,
title = {Collisions for the LPS Expander Graph Hash Function},
author = {Jean-Pierre Tillich and Gilles Z\'emor},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {254--269},
doi = {10.1007/978-3-540-78967-3_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15550,
title = {Second Preimage Attacks on Dithered Hash Functions},
author = {Elena Andreeva and Charles Bouillaguet and Pierre-Alain Fouque and Jonathan J. Hoch and John Kelsey and Adi Shamir and S\'ebastien Zimmer},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {270--288},
doi = {10.1007/978-3-540-78967-3_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15551,
title = {HB\#: Increasing the Security and Efficiency of HB+},
author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {361--378},
doi = {10.1007/978-3-540-78967-3_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15552,
title = {Key Recovery on Hidden Monomial Multivariate Schemes},
author = {Pierre-Alain Fouque and Gilles Macario-Rat and Jacques Stern},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {19--30},
doi = {10.1007/978-3-540-78967-3_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15553,
title = {David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware},
author = {Tal Moran and Gil Segev},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {527--544},
doi = {10.1007/978-3-540-78967-3_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15554,
title = {Towards Key-Dependent Message Security in the Standard Model},
author = {Dennis Hofheinz and Dominique Unruh},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {108--126},
doi = {10.1007/978-3-540-78967-3_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15555,
title = {Security/Efficiency Tradeoffs for Permutation-Based Hashing},
author = {Phillip Rogaway and John P. Steinberger},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {220--236},
doi = {10.1007/978-3-540-78967-3_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15556,
title = {Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors},
author = {Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr\'o and Daniel Wichs},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {471--488},
doi = {10.1007/978-3-540-78967-3_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15557,
title = {Efficient Sequential Aggregate Signed Data},
author = {Gregory Neven},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {52--69},
doi = {10.1007/978-3-540-78967-3_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15558,
title = {A Practical Attack on KeeLoq},
author = {Sebastiaan Indesteege and Nathan Keller and Orr Dunkelman and Eli Biham and Bart Preneel},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {1--18},
doi = {10.1007/978-3-540-78967-3_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15559,
title = {Proving Tight Security for Rabin-Williams Signatures},
author = {Daniel J. Bernstein},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {70--87},
doi = {10.1007/978-3-540-78967-3_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15560,
title = {On the Indifferentiability of the Sponge Construction},
author = {Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {181--197},
doi = {10.1007/978-3-540-78967-3_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15561,
title = {Isolated Proofs of Knowledge and Isolated Zero Knowledge},
author = {Ivan Damg\r ard and Jesper Buus Nielsen and Daniel Wichs},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {509--526},
doi = {10.1007/978-3-540-78967-3_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15562,
title = {New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5},
author = {Lei Wang and Kazuo Ohta and Noboru Kunihiro},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {237--253},
doi = {10.1007/978-3-540-78967-3_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15563,
title = {Efficient Two Party and Multi Party Computation Against Covert Adversaries},
author = {Vipul Goyal and Payman Mohassel and Adam Smith},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {289--306},
doi = {10.1007/978-3-540-78967-3_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15564,
title = {A New Mode of Operation for Block Ciphers and Length-Preserving MACs},
author = {Yevgeniy Dodis and Krzysztof Pietrzak and Prashant Puniya},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {198--219},
doi = {10.1007/978-3-540-78967-3_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-15565,
title = {Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme},
author = {Kaoru Kurosawa and Kazuhiro Suzuki},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {324--340},
doi = {10.1007/978-3-540-78967-3_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@proceedings{eurocrypt-2008-18384,
title = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
booktitle = {EUROCRYPT},
volume = {4965},
url = {http://link.springer.com/book/10.1007/978-3-540-78967-3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{eurocrypt-2008-18385,
title = {HB^{\#}: Increasing the Security and Efficiency of HB^{+}},
author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings},
volume = {4965},
pages = {361--378},
doi = {10.1007/978-3-540-78967-3_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15616,
title = {Cryptanalysis of LASH},
author = {Ron Steinfeld and Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Jian Guo and San Ling and Huaxiong Wang},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {207--223},
doi = {10.1007/978-3-540-71039-4_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15617,
title = {SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags},
author = {Adi Shamir},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {144--157},
doi = {10.1007/978-3-540-71039-4_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15618,
title = {Impossible Differential Cryptanalysis of CLEFIA},
author = {Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri and Teruo Saito and Tomoyasu Suzaki and Hiroyasu Kubo},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {398--411},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15618.pdf},
doi = {10.1007/978-3-540-71039-4_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15619,
title = {A Meet-in-the-Middle Attack on 8-Round AES},
author = {H\"useyin Demirci and Ali Aydin Sel\c cuk},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {116--126},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15619.pdf},
doi = {10.1007/978-3-540-71039-4_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15620,
title = {Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL},
author = {Eunjin Lee and Donghoon Chang and Jongsung Kim and Jaechul Sung and Seokhie Hong},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {189--206},
doi = {10.1007/978-3-540-71039-4_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15621,
title = {The Hash Function Family LAKE},
author = {Jean-Philippe Aumasson and Willi Meier and Raphael C.-W. Phan},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {36--53},
doi = {10.1007/978-3-540-71039-4_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15622,
title = {Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis},
author = {Matthieu Rivain and Emmanuelle Dottax and Emmanuel Prouff},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {127--143},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15622.pdf},
doi = {10.1007/978-3-540-71039-4_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15623,
title = {A Unified Approach to Related-Key Attacks},
author = {Eli Biham and Orr Dunkelman and Nathan Keller},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {73--96},
doi = {10.1007/978-3-540-71039-4_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15624,
title = {Algebraic and Slide Attacks on KeeLoq},
author = {Nicolas Courtois and Gregory V. Bard and David Wagner},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {97--115},
doi = {10.1007/978-3-540-71039-4_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15625,
title = {Improved Indifferentiability Security Analysis of chopMD Hash Function},
author = {Donghoon Chang and Mridul Nandi},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {429--443},
doi = {10.1007/978-3-540-71039-4_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15626,
title = {Entropy of the Internal State of an FCSR in Galois Representation},
author = {Andrea R\"ock},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {343--362},
doi = {10.1007/978-3-540-71039-4_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15627,
title = {SWIFFT: A Modest Proposal for FFT Hashing},
author = {Vadim Lyubashevsky and Daniele Micciancio and Chris Peikert and Alon Rosen},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {54--72},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15627.pdf},
doi = {10.1007/978-3-540-71039-4_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15628,
title = {Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent},
author = {Baudoin Collard and Fran\c cois-Xavier Standaert and Jean-Jacques Quisquater},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {382--397},
doi = {10.1007/978-3-540-71039-4_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15629,
title = {Collisions for Step-Reduced SHA-256},
author = {Ivica Nikolic and Alex Biryukov},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {1--15},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15629.pdf},
doi = {10.1007/978-3-540-71039-4_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15630,
title = {On the Salsa20 Core Function},
author = {Julio C\'esar Hern\'andez Castro and Juan M. Est\'evez-Tapiador and Jean-Jacques Quisquater},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {462--469},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15630.pdf},
doi = {10.1007/978-3-540-71039-4_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15631,
title = {Efficient Reconstruction of RC4 Keys from Internal States},
author = {Eli Biham and Yaniv Carmeli},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {270--288},
doi = {10.1007/978-3-540-71039-4_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15632,
title = {New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru},
author = {Eli Biham},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {444--461},
doi = {10.1007/978-3-540-71039-4_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15633,
title = {Post-Processing Functions for a Biased Physical Random Number Generator},
author = {Patrick Lacharme},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {334--342},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15633.pdf},
doi = {10.1007/978-3-540-71039-4_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15634,
title = {A (Second) Preimage Attack on the GOST Hash Function},
author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {224--234},
doi = {10.1007/978-3-540-71039-4_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15635,
title = {Differential Fault Analysis of Trivium},
author = {Michal Hojs\'\ik and Bohuslav Rudolf},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {158--172},
doi = {10.1007/978-3-540-71039-4_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15636,
title = {How to Encrypt with a Malicious Random Number Generator},
author = {Seny Kamara and Jonathan Katz},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {303--315},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15636.pdf},
doi = {10.1007/978-3-540-71039-4_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15637,
title = {Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator},
author = {Blandine Debraize and Louis Goubin},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {235--252},
doi = {10.1007/978-3-540-71039-4_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15638,
title = {MD4 is Not One-Way},
author = {Ga\"etan Leurent},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {412--428},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15638.pdf},
doi = {10.1007/978-3-540-71039-4_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15639,
title = {Bit-Pattern Based Integral Attack},
author = {Muhammad Reza Z'aba and H\r avard Raddum and Matthew Henricksen and Ed Dawson},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {363--381},
doi = {10.1007/978-3-540-71039-4_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15640,
title = {New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba},
author = {Jean-Philippe Aumasson and Simon Fischer and Shahram Khazaei and Willi Meier and Christian Rechberger},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {470--488},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15640.pdf},
doi = {10.1007/978-3-540-71039-4_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@proceedings{fse-2008-18386,
title = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
booktitle = {FSE},
volume = {5086},
url = {http://link.springer.com/book/10.1007/978-3-540-71039-4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15611,
title = {An Improved Security Bound for HCTR},
author = {Debrup Chakraborty and Mridul Nandi},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {289--302},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15611.pdf},
doi = {10.1007/978-3-540-71039-4_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15612,
title = {New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4},
author = {Subhamoy Maitra and Goutam Paul},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {253--269},
doi = {10.1007/978-3-540-71039-4_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15613,
title = {Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation},
author = {Yedidya Hilewitz and Yiqun Lisa Yin and Ruby B. Lee},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {173--188},
doi = {10.1007/978-3-540-71039-4_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15614,
title = {Collisions on SHA-0 in One Hour},
author = {St\'ephane Manuel and Thomas Peyrin},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {16--35},
url = {http://www.iacr.org/cryptodb/archive/2008/FSE/paper/15614.pdf},
doi = {10.1007/978-3-540-71039-4_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{fse-2008-15615,
title = {A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier},
author = {Kan Yasuda},
booktitle = {Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
volume = {5086},
pages = {316--333},
doi = {10.1007/978-3-540-71039-4_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@article{jofc-2008-18432,
title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions},
author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone-Lee and Gregory Neven and Pascal Paillier and Haixia Shi},
journal = {J. Cryptology},
volume = {21},
pages = {350--391},
doi = {10.1007/s00145-007-9006-6},
year = {2008}
}
@article{jofc-2008-18433,
title = {Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs},
author = {Jonathan Katz and Yehuda Lindell},
journal = {J. Cryptology},
volume = {21},
pages = {303--349},
doi = {10.1007/s00145-007-9004-8},
year = {2008}
}
@article{jofc-2008-18434,
title = {Index Calculus in Class Groups of Non-hyperelliptic Curves of Genus Three},
author = {Claus Diem and Emmanuel Thom\'e},
journal = {J. Cryptology},
volume = {21},
pages = {593--611},
doi = {10.1007/s00145-007-9014-6},
year = {2008}
}
@article{jofc-2008-14380,
title = {Simpler Session-Key Generation from Short Random Passwords},
author = {Minh-Huyen Nguyen and Salil P. Vadhan},
journal = {J. Cryptology},
volume = {21},
pages = {52--96},
doi = {10.1007/s00145-007-9008-4},
year = {2008}
}
@article{jofc-2008-14381,
title = {Tag-KEM/DEM: A New Framework for Hybrid Encryption},
author = {Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa},
journal = {J. Cryptology},
volume = {21},
pages = {97--130},
doi = {10.1007/s00145-007-9010-x},
year = {2008}
}
@article{jofc-2008-14382,
title = {On Probability of Success in Linear and Differential Cryptanalysis},
author = {Ali Aydin Sel\c cuk},
journal = {J. Cryptology},
volume = {21},
pages = {131--147},
doi = {10.1007/s00145-007-9013-7},
year = {2008}
}
@article{jofc-2008-14383,
title = {Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes},
author = {Raphael Overbeck},
journal = {J. Cryptology},
volume = {21},
pages = {280--301},
doi = {10.1007/s00145-007-9003-9},
year = {2008}
}
@article{jofc-2008-14384,
title = {Practical Construction and Analysis of Pseudo-Randomness Primitives},
author = {Johan H\r astad and Mats N\"aslund},
journal = {J. Cryptology},
volume = {21},
pages = {1--26},
doi = {10.1007/s00145-007-9009-3},
year = {2008}
}
@article{jofc-2008-14385,
title = {Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups},
author = {Dan Boneh and Xavier Boyen},
journal = {J. Cryptology},
volume = {21},
pages = {149--177},
doi = {10.1007/s00145-007-9005-7},
year = {2008}
}
@article{jofc-2008-14386,
title = {Lower Bounds and Impossibility Results for Concurrent Self Composition},
author = {Yehuda Lindell},
journal = {J. Cryptology},
volume = {21},
pages = {200--249},
doi = {10.1007/s00145-007-9015-5},
year = {2008}
}
@article{jofc-2008-14387,
title = {Generic Constructions of Identity-Based and Certificateless KEMs},
author = {Kamel Bentahar and Pooya Farshim and John Malone-Lee and Nigel P. Smart},
journal = {J. Cryptology},
volume = {21},
pages = {178--199},
doi = {10.1007/s00145-007-9000-z},
year = {2008}
}
@article{jofc-2008-14388,
title = {Cryptanalysis of ISO/IEC 9796-1},
author = {Don Coppersmith and Jean-S\'ebastien Coron and Fran\c cois Grieu and Shai Halevi and Charanjit S. Jutla and David Naccache and Julien P. Stern},
journal = {J. Cryptology},
volume = {21},
pages = {27--51},
doi = {10.1007/s00145-007-9007-5},
year = {2008}
}
@article{jofc-2008-14389,
title = {Probabilistic Reliability and Privacy of Communication Using Multicast in General Neighbor Networks},
author = {J\'er\^ome Renault and Tristan Tomala},
journal = {J. Cryptology},
volume = {21},
pages = {250--279},
doi = {10.1007/s00145-007-9018-2},
year = {2008}
}
@article{jofc-2008-18425,
title = {Cryptanalysis of an E0-like Combiner with Memory},
author = {Yi Lu 0002 and Serge Vaudenay},
journal = {J. Cryptology},
volume = {21},
pages = {430--457},
doi = {10.1007/s00145-007-9017-3},
year = {2008}
}
@article{jofc-2008-18426,
title = {On the Relationships between Notions of Simulation-Based Security},
author = {Ralf K\"usters and Anupam Datta and John C. Mitchell and Ajith Ramanathan},
journal = {J. Cryptology},
volume = {21},
pages = {492--546},
doi = {10.1007/s00145-008-9019-9},
year = {2008}
}
@article{jofc-2008-18427,
title = {Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm},
author = {Mihir Bellare and Chanathip Namprempre},
journal = {J. Cryptology},
volume = {21},
pages = {469--491},
doi = {10.1007/s00145-008-9026-x},
year = {2008}
}
@article{jofc-2008-18428,
title = {Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication},
author = {Elad Barkan and Eli Biham and Nathan Keller},
journal = {J. Cryptology},
volume = {21},
pages = {392--429},
doi = {10.1007/s00145-007-9001-y},
year = {2008}
}
@article{jofc-2008-18429,
title = {New Binding-Concealing Trade-Offs for Quantum String Commitment},
author = {Rahul Jain},
journal = {J. Cryptology},
volume = {21},
pages = {579--592},
doi = {10.1007/s00145-008-9025-y},
year = {2008}
}
@article{jofc-2008-18430,
title = {Cryptanalysis of the Shpilrain-Ushakov Protocol for Thompson's Group},
author = {Francesco Matucci},
journal = {J. Cryptology},
volume = {21},
pages = {458--468},
doi = {10.1007/s00145-007-9016-4},
year = {2008}
}
@article{jofc-2008-18431,
title = {Encryption Modes with Almost Free Message Integrity},
author = {Charanjit S. Jutla},
journal = {J. Cryptology},
volume = {21},
pages = {547--578},
doi = {10.1007/s00145-008-9024-z},
year = {2008}
}
@inproceedings{pkc-2008-14391,
title = {Lattice-Based Identification Schemes Secure Under Active Attacks},
author = {Vadim Lyubashevsky},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {162--179},
doi = {10.1007/978-3-540-78440-1_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14392,
title = {Efficient Simultaneous Broadcast},
author = {Sebastian Faust and Emilia K\"asper and Stefan Lucks},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {180--196},
doi = {10.1007/978-3-540-78440-1_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14393,
title = {Completely Non-malleable Encryption Revisited},
author = {Carmine Ventre and Ivan Visconti},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {65--84},
doi = {10.1007/978-3-540-78440-1_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14394,
title = {Online-Untransferable Signatures},
author = {Moses Liskov and Silvio Micali},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {248--267},
doi = {10.1007/978-3-540-78440-1_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14395,
title = {Cryptographic Test Correction},
author = {\'Eric Levieil and David Naccache},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {85--100},
doi = {10.1007/978-3-540-78440-1_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14396,
title = {SAS-Based Group Authentication and Key Agreement Protocols},
author = {Sven Laur and Sylvain Pasini},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {197--213},
doi = {10.1007/978-3-540-78440-1_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14397,
title = {Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time},
author = {Yi-Ru Liu and Wen-Guey Tzeng},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {380--396},
doi = {10.1007/978-3-540-78440-1_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14398,
title = {A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents},
author = {Sungwook Kim and Jung Hee Cheon},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {328--343},
doi = {10.1007/978-3-540-78440-1_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14399,
title = {Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption},
author = {Beno\^\it Libert and Damien Vergnaud},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {360--379},
doi = {10.1007/978-3-540-78440-1_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14400,
title = {Recovering NTRU Secret Key from Inversion Oracles},
author = {Petros Mol and Moti Yung},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {18--36},
doi = {10.1007/978-3-540-78440-1_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14401,
title = {Total Break of the *l*-IC Signature Scheme},
author = {Pierre-Alain Fouque and Gilles Macario-Rat and Ludovic Perret and Jacques Stern},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {1--17},
doi = {10.1007/978-3-540-78440-1_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14402,
title = {Relations Among Notions of Plaintext Awareness},
author = {James Birkett and Alexander W. Dent},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {47--64},
doi = {10.1007/978-3-540-78440-1_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14403,
title = {An Analysis of the Vector Decomposition Problem},
author = {Steven D. Galbraith and Eric R. Verheul},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {308--327},
doi = {10.1007/978-3-540-78440-1_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14404,
title = {Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?},
author = {Alexander May and Maike Ritzenhofen},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {37--46},
doi = {10.1007/978-3-540-78440-1_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14405,
title = {An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm},
author = {Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek A. El-Ghazawi},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {214--228},
doi = {10.1007/978-3-540-78440-1_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14406,
title = {Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results},
author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {101--120},
doi = {10.1007/978-3-540-78440-1_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14407,
title = {Proxy Signatures Secure Against Proxy Key Exposure},
author = {Jacob C. N. Schuldt and Kanta Matsuura and Kenneth G. Paterson},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {141--161},
doi = {10.1007/978-3-540-78440-1_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14408,
title = {New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields},
author = {Patrick Longa and Ali Miri},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {229--247},
doi = {10.1007/978-3-540-78440-1_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14409,
title = {A Digital Signature Scheme Based on CVP_{infinity}},
author = {Thomas Plantard and Willy Susilo and Khin Than Win},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {288--307},
doi = {10.1007/978-3-540-78440-1_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14410,
title = {Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures},
author = {Siamak Fayyaz Shahandashti and Reihaneh Safavi-Naini},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {121--140},
doi = {10.1007/978-3-540-78440-1_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14411,
title = {Security of Digital Signature Schemes in Weakened Random Oracle Models},
author = {Akira Numayama and Toshiyuki Isshiki and Keisuke Tanaka},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {268--287},
doi = {10.1007/978-3-540-78440-1_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{pkc-2008-14412,
title = {Certificateless Encryption Schemes Strongly Secure in the Standard Model},
author = {Alexander W. Dent and Beno\^\it Libert and Kenneth G. Paterson},
booktitle = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
volume = {4939},
pages = {344--359},
doi = {10.1007/978-3-540-78440-1_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@proceedings{pkc-2008-18387,
title = {Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings},
booktitle = {PKC},
volume = {4939},
url = {http://link.springer.com/book/10.1007/978-3-540-78440-1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14345,
title = {Faster and Shorter Password-Authenticated Key Exchange},
author = {Rosario Gennaro},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {589--606},
doi = {10.1007/978-3-540-78524-8_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14346,
title = {Multi-property Preserving Combiners for Hash Functions},
author = {Marc Fischlin and Anja Lehmann},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {375--392},
doi = {10.1007/978-3-540-78524-8_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14347,
title = {P-signatures and Noninteractive Anonymous Credentials},
author = {Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {356--374},
doi = {10.1007/978-3-540-78524-8_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14348,
title = {The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization},
author = {Daniele Micciancio and Scott Yilek},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {535--552},
doi = {10.1007/978-3-540-78524-8_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14349,
title = {General Properties of Quantum Zero-Knowledge Proofs},
author = {Hirotada Kobayashi},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {107--124},
doi = {10.1007/978-3-540-78524-8_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14351,
title = {An Equivalence Between Zero Knowledge and Commitments},
author = {Shien Jin Ong and Salil P. Vadhan},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {482--500},
doi = {10.1007/978-3-540-78524-8_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14352,
title = {Concurrent Non-malleable Commitments from Any One-Way Function},
author = {Huijia Lin and Rafael Pass and Muthuramakrishnan Venkitasubramaniam},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {571--588},
doi = {10.1007/978-3-540-78524-8_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14353,
title = {Matroids Can Be Far from Ideal Secret Sharing},
author = {Amos Beimel and Noam Livne and Carles Padr\'o},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {194--212},
doi = {10.1007/978-3-540-78524-8_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14354,
title = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators},
author = {Nenad Dedic and Danny Harnik and Leonid Reyzin},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {607--625},
doi = {10.1007/978-3-540-78524-8_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14355,
title = {Bridging Game Theory and Cryptography: Recent Results and Future Directions},
author = {Jonathan Katz},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {251--272},
doi = {10.1007/978-3-540-78524-8_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14356,
title = {Lower Bounds on Implementing Robust and Resilient Mediators},
author = {Ittai Abraham and Danny Dolev and Joseph Y. Halpern},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {302--319},
doi = {10.1007/978-3-540-78524-8_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14357,
title = {A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval},
author = {Iftach Haitner and Jonathan J. Hoch and Gil Segev},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {445--464},
doi = {10.1007/978-3-540-78524-8_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14358,
title = {Equivocal Blind Signatures and Adaptive UC-Security},
author = {Aggelos Kiayias and Hong-Sheng Zhou},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {340--355},
doi = {10.1007/978-3-540-78524-8_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14359,
title = {OT-Combiners via Secure Computation},
author = {Danny Harnik and Yuval Ishai and Eyal Kushilevitz and Jesper Buus Nielsen},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {393--411},
doi = {10.1007/978-3-540-78524-8_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14360,
title = {Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One},
author = {Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {427--444},
doi = {10.1007/978-3-540-78524-8_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14361,
title = {Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency},
author = {Paul Valiant},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {1--18},
doi = {10.1007/978-3-540-78524-8_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14362,
title = {Cryptography and Game Theory: Designing Protocols for Exchanging Information},
author = {Gillat Kol and Moni Naor},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {320--339},
doi = {10.1007/978-3-540-78524-8_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14363,
title = {Randomness Extraction Via *delta* -Biased Masking in the Presence of a Quantum Attacker},
author = {Serge Fehr and Christian Schaffner},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {465--481},
doi = {10.1007/978-3-540-78524-8_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14364,
title = {On Seed-Incompressible Functions},
author = {Shai Halevi and Steven Myers and Charles Rackoff},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {19--36},
doi = {10.1007/978-3-540-78524-8_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14365,
title = {Basing Weak Public-Key Cryptography on Strong One-Way Functions},
author = {Eli Biham and Yaron J. Goren and Yuval Ishai},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {55--72},
doi = {10.1007/978-3-540-78524-8_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14366,
title = {MPC vs. SFE: Perfect Security in a Unified Corruption Model},
author = {Zuzana Beerliov\'a-Trub\'\iniov\'a and Matthias Fitzi and Martin Hirt and Ueli M. Maurer and Vassilis Zikas},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {231--250},
doi = {10.1007/978-3-540-78524-8_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14367,
title = {Perfectly-Secure MPC with Linear Communication Complexity},
author = {Zuzana Beerliov\'a-Trub\'\iniov\'a and Martin Hirt},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {213--230},
doi = {10.1007/978-3-540-78524-8_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14368,
title = {Asymptotically Efficient Lattice-Based Digital Signatures},
author = {Vadim Lyubashevsky and Daniele Micciancio},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {37--54},
doi = {10.1007/978-3-540-78524-8_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14369,
title = {The Layered Games Framework for Specifications and Analysis of Security Protocols},
author = {Amir Herzberg and Igal Yoffe},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {125--141},
doi = {10.1007/978-3-540-78524-8_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14370,
title = {Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model},
author = {Andr\'e Chailloux and Dragos Florin Ciocan and Iordanis Kerenidis and Salil P. Vadhan},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {501--534},
doi = {10.1007/978-3-540-78524-8_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14371,
title = {Which Languages Have 4-Round Zero-Knowledge Proofs?},
author = {Jonathan Katz},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {73--88},
doi = {10.1007/978-3-540-78524-8_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14372,
title = {Degradation and Amplification of Computational Hardness},
author = {Shai Halevi and Tal Rabin},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {626--643},
doi = {10.1007/978-3-540-78524-8_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14373,
title = {Universally Composable Multi-party Computation with an Unreliable Common Reference String},
author = {Vipul Goyal and Jonathan Katz},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {142--154},
doi = {10.1007/978-3-540-78524-8_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14374,
title = {Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries},
author = {Carmit Hazay and Yehuda Lindell},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {155--175},
doi = {10.1007/978-3-540-78524-8_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14375,
title = {Fast Private Norm Estimation and Heavy Hitters},
author = {Joe Kilian and Andr\'e Madeira and Martin J. Strauss and Xuan Zheng},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {176--193},
doi = {10.1007/978-3-540-78524-8_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14376,
title = {How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge},
author = {Lior Malka},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {89--106},
doi = {10.1007/978-3-540-78524-8_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14377,
title = {Verifiably Secure Devices},
author = {Sergei Izmalkov and Matt Lepinski and Silvio Micali},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {273--301},
doi = {10.1007/978-3-540-78524-8_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14378,
title = {On Constant-Round Concurrent Zero-Knowledge},
author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {553--570},
doi = {10.1007/978-3-540-78524-8_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{tcc-2008-14379,
title = {Semi-honest to Malicious Oblivious Transfer - The Black-Box Way},
author = {Iftach Haitner},
booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.},
volume = {4948},
pages = {412--426},
doi = {10.1007/978-3-540-78524-8_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@proceedings{tcc-2008-18389,
title = {Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008},
booktitle = {TCC},
volume = {4948},
url = {http://link.springer.com/book/10.1007/978-3-540-78524-8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2008}
}
@inproceedings{asiacrypt-2007-512,
title = {Cryptanalysis of the Tiger Hash Function},
author = {Florian Mendel and Vincent Rijmen},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {536--550},
doi = {10.1007/978-3-540-76900-2_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-516,
title = {Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys},
author = {C\'ecile Delerabl\'ee},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {200--215},
doi = {10.1007/978-3-540-76900-2_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-518,
title = {How to Build a Hash Function from Any Collision-Resistant Function},
author = {Thomas Ristenpart and Thomas Shrimpton},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {147--163},
doi = {10.1007/978-3-540-76900-2_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-520,
title = {A Simple Variant of the Merkle-Damg\r ard Scheme with a Permutation},
author = {Shoichi Hirose and Je Hong Park and Aaram Yun},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {113--129},
doi = {10.1007/978-3-540-76900-2_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-522,
title = {Relations Among Notions of Non-malleability for Encryption},
author = {Rafael Pass and Abhi Shelat and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {519--535},
doi = {10.1007/978-3-540-76900-2_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-524,
title = {Multi-party Indirect Indexing and Applications},
author = {Matthew K. Franklin and Mark Gondree and Payman Mohassel},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {283--297},
doi = {10.1007/978-3-540-76900-2_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-526,
title = {Bounded CCA2-Secure Encryption},
author = {Ronald Cramer and Goichiro Hanaoka and Dennis Hofheinz and Hideki Imai and Eike Kiltz and Rafael Pass and Abhi Shelat and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {502--518},
doi = {10.1007/978-3-540-76900-2_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-528,
title = {Authenticated Key Exchange and Key Encapsulation in the Standard Model},
author = {Tatsuaki Okamoto},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {474--484},
doi = {10.1007/978-3-540-76900-2_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-530,
title = {Symmetric Key Cryptography on Modern Graphics Hardware},
author = {Jason Yang and James Goodman},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {249--264},
doi = {10.1007/978-3-540-76900-2_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-532,
title = {Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions},
author = {Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky and Amit Sahai},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {444--459},
doi = {10.1007/978-3-540-76900-2_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-534,
title = {On Tweaking Luby-Rackoff Blockciphers},
author = {David Goldenberg and Susan Hohenberger and Moses Liskov and Elizabeth Crump Schwartz and Hakan Seyalioglu},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {342--356},
doi = {10.1007/978-3-540-76900-2_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-569,
title = {Efficient Byzantine Agreement with Faulty Minority},
author = {Zuzana Beerliov\'a-Trub\'\iniov\'a and Martin Hirt and Micha Riser},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {393--409},
doi = {10.1007/978-3-540-76900-2_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-570,
title = {Simple and Efficient Perfectly-Secure Asynchronous MPC},
author = {Zuzana Beerliov\'a-Trub\'\iniov\'a and Martin Hirt},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {376--392},
doi = {10.1007/978-3-540-76900-2_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@proceedings{asiacrypt-2007-386,
title = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
booktitle = {ASIACRYPT},
volume = {4833},
url = {http://link.springer.com/book/10.1007/978-3-540-76900-2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-464,
title = {Miniature CCA2 PK Encryption: Tight Security Without Redundancy},
author = {Xavier Boyen},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {485--501},
doi = {10.1007/978-3-540-76900-2_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-466,
title = {Cryptanalysis of Grindahl},
author = {Thomas Peyrin},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {551--567},
doi = {10.1007/978-3-540-76900-2_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-468,
title = {A Key Recovery Attack on Edon80},
author = {Martin Hell and Thomas Johansson},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {568--581},
doi = {10.1007/978-3-540-76900-2_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-470,
title = {Information-Theoretic Security Without an Honest Majority},
author = {Anne Broadbent and Alain Tapp},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {410--426},
doi = {10.1007/978-3-540-76900-2_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-472,
title = {Two-Party Computing with Encrypted Data},
author = {Seung Geol Choi and Ariel Elbaz and Ari Juels and Tal Malkin and Moti Yung},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {298--314},
doi = {10.1007/978-3-540-76900-2_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-474,
title = {Blind Identity-Based Encryption and Simulatable Oblivious Transfer},
author = {Matthew Green and Susan Hohenberger},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {265--282},
doi = {10.1007/978-3-540-76900-2_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-476,
title = {Group Encryption},
author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {181--199},
doi = {10.1007/978-3-540-76900-2_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-478,
title = {Seven-Property-Preserving Iterated Hashing: ROX},
author = {Elena Andreeva and Gregory Neven and Bart Preneel and Thomas Shrimpton},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {130--146},
doi = {10.1007/978-3-540-76900-2_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-480,
title = {Anonymous Quantum Communication},
author = {Gilles Brassard and Anne Broadbent and Joseph Fitzsimons and S\'ebastien Gambs and Alain Tapp},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {460--473},
doi = {10.1007/978-3-540-76900-2_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-482,
title = {Known-Key Distinguishers for Some Block Ciphers},
author = {Lars R. Knudsen and Vincent Rijmen},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {315--324},
doi = {10.1007/978-3-540-76900-2_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-486,
title = {Faster Addition and Doubling on Elliptic Curves},
author = {Daniel J. Bernstein and Tanja Lange},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {29--50},
doi = {10.1007/978-3-540-76900-2_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-488,
title = {A Non-interactive Shuffle with Pairing Based Verifiability},
author = {Jens Groth and Steve Lu},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {51--67},
doi = {10.1007/978-3-540-76900-2_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-490,
title = {Obtaining Universally Compoable Security: Towards the Bare Bones of Trust},
author = {Ran Canetti},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {88--112},
doi = {10.1007/978-3-540-76900-2_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-492,
title = {Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions},
author = {Jacques Patarin and Val\'erie Nachef and C\^ome Berbain},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {325--341},
doi = {10.1007/978-3-540-76900-2_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-494,
title = {When *e*-th Roots Become Easier Than Factoring},
author = {Antoine Joux and David Naccache and Emmanuel Thom\'e},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {13--28},
doi = {10.1007/978-3-540-76900-2_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-498,
title = {Fully Anonymous Group Signatures Without Random Oracles},
author = {Jens Groth},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {164--180},
doi = {10.1007/978-3-540-76900-2_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-500,
title = {On Efficient Message Authentication Via Block Cipher Design Techniques},
author = {Goce Jakimoski and K. P. Subbalakshmi},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {232--248},
doi = {10.1007/978-3-540-76900-2_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-502,
title = {Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations},
author = {Ueli M. Maurer and Dominik Raub},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {427--443},
doi = {10.1007/978-3-540-76900-2_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-504,
title = {On Privacy Models for RFID},
author = {Serge Vaudenay},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {68--87},
doi = {10.1007/978-3-540-76900-2_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-506,
title = {A Kilobit Special Number Field Sieve Factorization},
author = {Kazumaro Aoki and Jens Franke and Thorsten Kleinjung and Arjen K. Lenstra and Dag Arne Osvik},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {1--12},
doi = {10.1007/978-3-540-76900-2_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-508,
title = {Boosting Merkle-Damg\r ard Hashing for Message Authentication},
author = {Kan Yasuda},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {216--231},
doi = {10.1007/978-3-540-76900-2_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2007-510,
title = {Secure Protocols with Asymmetric Trust},
author = {Ivan Damg\r ard and Yvo Desmedt and Matthias Fitzi and Jesper Buus Nielsen},
booktitle = {Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings},
volume = {4833},
pages = {357--375},
doi = {10.1007/978-3-540-76900-2_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-806,
title = {Side Channel Cryptanalysis of a Higher Order Masking Scheme},
author = {Jean-S\'ebastien Coron and Emmanuel Prouff and Matthieu Rivain},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {28--44},
doi = {10.1007/978-3-540-74735-2_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-808,
title = {FPGA Design of Self-certified Signature Verification on Koblitz Curves},
author = {Kimmo U. J\"arvinen and Juha Forsten and Jorma Skytt\"a},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {256--271},
doi = {10.1007/978-3-540-74735-2_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-813,
title = {A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter},
author = {Joshua Jaffe},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {1--13},
doi = {10.1007/978-3-540-74735-2_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-816,
title = {RF-DNA: Radio-Frequency Certificates of Authenticity},
author = {Gerald DeJean and Darko Kirovski},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {346--363},
doi = {10.1007/978-3-540-74735-2_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-818,
title = {How to Maximize the Potential of FPGA Resources for Modular Exponentiation},
author = {Daisuke Suzuki},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {272--288},
doi = {10.1007/978-3-540-74735-2_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-821,
title = {CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method},
author = {Tetsuya Izu and Jun Kogure and Takeshi Shimoyama},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {364--377},
doi = {10.1007/978-3-540-74735-2_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-822,
title = {Gaussian Mixture Models for Higher-Order Side Channel Analysis},
author = {Kerstin Lemke-Rust and Christof Paar},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {14--27},
doi = {10.1007/978-3-540-74735-2_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-824,
title = {Differential Behavioral Analysis},
author = {Bruno Robisson and Pascal Manet},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {413--426},
doi = {10.1007/978-3-540-74735-2_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-829,
title = {On the Implementation of a Fast Prime Generation Algorithm},
author = {Christophe Clavier and Jean-S\'ebastien Coron},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {443--449},
doi = {10.1007/978-3-540-74735-2_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-831,
title = {Collision Attacks on AES-Based MAC: Alpha-MAC},
author = {Alex Biryukov and Andrey Bogdanov and Dmitry Khovratovich and Timo Kasper},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {166--180},
doi = {10.1007/978-3-540-74735-2_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-832,
title = {Power Analysis Resistant AES Implementation with Instruction Set Extensions},
author = {Stefan Tillich and Johann Gro\sssch\"adl},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {303--319},
doi = {10.1007/978-3-540-74735-2_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-835,
title = {Masking and Dual-Rail Logic Don't Add Up},
author = {Patrick Schaumont and Kris Tiri},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {95--106},
doi = {10.1007/978-3-540-74735-2_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-836,
title = {DPA-Resistance Without Routing Constraints?},
author = {Benedikt Gierlichs},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {107--120},
doi = {10.1007/978-3-540-74735-2_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-838,
title = {AES Encryption Implementation and Analysis on Commodity Graphics Processing Units},
author = {Owen Harrison and John Waldron},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {209--226},
doi = {10.1007/978-3-540-74735-2_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-842,
title = {RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?},
author = {O. Savry and F. Pebay-Peyroula and F. Dehmas and G. Robert and J. Reverdy},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {334--345},
doi = {10.1007/978-3-540-74735-2_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-844,
title = {Secret External Encodings Do Not Prevent Transient Fault Analysis},
author = {Christophe Clavier},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {181--194},
doi = {10.1007/978-3-540-74735-2_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-846,
title = {Evaluation of the Masked Logic Style MDPL on a Prototype Chip},
author = {Thomas Popp and Mario Kirschbaum and Thomas Zefferer and Stefan Mangard},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {81--94},
doi = {10.1007/978-3-540-74735-2_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-848,
title = {PRESENT: An Ultra-Lightweight Block Cipher},
author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin and C. Vikkelsoe},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {450--466},
doi = {10.1007/978-3-540-74735-2_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-850,
title = {Two New Techniques of Side-Channel Cryptanalysis},
author = {Alex Biryukov and Dmitry Khovratovich},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {195--208},
doi = {10.1007/978-3-540-74735-2_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-852,
title = {MAME: A Compression Function with Reduced Hardware Requirements},
author = {Hirotaka Yoshida and Dai Watanabe and Katsuyuki Okeya and Jun Kitahara and Hongjun Wu and \"Ozg\"ul K\"u\c c\"uk and Bart Preneel},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {148--165},
doi = {10.1007/978-3-540-74735-2_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-854,
title = {High-Speed True Random Number Generation with Logic Gates Only},
author = {Markus Dichtl and Jovan Dj. Golic},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {45--62},
doi = {10.1007/978-3-540-74735-2_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-856,
title = {Arithmetic Operators for Pairing-Based Cryptography},
author = {Jean-Luc Beuchat and Nicolas Brisebarre and J\'er\'emie Detrey and Eiji Okamoto},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {239--255},
doi = {10.1007/978-3-540-74735-2_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-858,
title = {On the Power of Bitslice Implementation on Intel Core2 Processor},
author = {Mitsuru Matsui and Junko Nakajima},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {121--134},
doi = {10.1007/978-3-540-74735-2_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-860,
title = {Multi-gigabit GCM-AES Architecture Optimized for FPGAs},
author = {Stefan Lemsitzer and Johannes Wolkerstorfer and Norbert Felber and Matthias Braendli},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {227--238},
doi = {10.1007/978-3-540-74735-2_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-862,
title = {Power and EM Attacks on Passive 13.56 MHz RFID Devices},
author = {Michael Hutter and Stefan Mangard and Martin Feldhofer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {320--333},
doi = {10.1007/978-3-540-74735-2_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-864,
title = {TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks},
author = {Reouven Elbaz and David Champagne and Ruby B. Lee and Lionel Torres and Gilles Sassatelli and Pierre Guillemin},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {289--302},
doi = {10.1007/978-3-540-74735-2_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-866,
title = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles},
author = {Fran\c cois Mac\'e and Fran\c cois-Xavier Standaert and Jean-Jacques Quisquater},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {427--442},
doi = {10.1007/978-3-540-74735-2_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-868,
title = {A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations},
author = {Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {394--412},
doi = {10.1007/978-3-540-74735-2_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-870,
title = {Collision Search for Elliptic Curve Discrete Logarithm over GF(2^{ m }) with FPGA},
author = {Guerric Meurice de Dormale and Philippe Bulens and Jean-Jacques Quisquater},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {378--393},
doi = {10.1007/978-3-540-74735-2_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-872,
title = {FPGA Intrinsic PUFs and Their Use for IP Protection},
author = {Jorge Guajardo and Sandeep S. Kumar and Geert Jan Schrijen and Pim Tuyls},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {63--80},
doi = {10.1007/978-3-540-74735-2_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{ches-2007-874,
title = {Highly Regular Right-to-Left Algorithms for Scalar Multiplication},
author = {Marc Joye},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
volume = {4727},
pages = {135--147},
doi = {10.1007/978-3-540-74735-2_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@proceedings{ches-2007-720,
title = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
booktitle = {CHES},
volume = {4727},
url = {http://link.springer.com/book/10.1007/978-3-540-74735-2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1861,
title = {Secure Hybrid Encryption from Weakened Key Encapsulation},
author = {Dennis Hofheinz and Eike Kiltz},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {553--571},
doi = {10.1007/978-3-540-74143-5_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1862,
title = {Information Security Economics - and Beyond},
author = {Ross Anderson and Tyler Moore},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {68--91},
doi = {10.1007/978-3-540-74143-5_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1863,
title = {Deterministic and Efficiently Searchable Encryption},
author = {Mihir Bellare and Alexandra Boldyreva and Adam O'Neill},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {535--552},
doi = {10.1007/978-3-540-74143-5_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1864,
title = {Amplifying Collision Resistance: A Complexity-Theoretic Treatment},
author = {Ran Canetti and Ronald L. Rivest and Madhu Sudan and Luca Trevisan and Salil P. Vadhan and Hoeteck Wee},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {264--283},
doi = {10.1007/978-3-540-74143-5_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1871,
title = {Security-Amplifying Combiners for Collision-Resistant Hash Functions},
author = {Marc Fischlin and Anja Lehmann},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {224--243},
doi = {10.1007/978-3-540-74143-5_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1872,
title = {Secure Identification and QKD in the Bounded-Quantum-Storage Model},
author = {Ivan Damg\r ard and Serge Fehr and Louis Salvail and Christian Schaffner},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {342--359},
doi = {10.1007/978-3-540-74143-5_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1873,
title = {Practical Cryptanalysis of SFLASH},
author = {Vivien Dubois and Pierre-Alain Fouque and Adi Shamir and Jacques Stern},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {1--12},
doi = {10.1007/978-3-540-74143-5_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1874,
title = {Invertible Universal Hashing and the TET Encryption Mode},
author = {Shai Halevi},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {412--429},
doi = {10.1007/978-3-540-74143-5_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1875,
title = {Improved Analysis of Kannan's Shortest Lattice Vector Algorithm},
author = {Guillaume Hanrot and Damien Stehl\'e},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {170--186},
doi = {10.1007/978-3-540-74143-5_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1876,
title = {Rerandomizable RCCA Encryption},
author = {Manoj Prabhakaran and Mike Rosulek},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {517--534},
doi = {10.1007/978-3-540-74143-5_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1877,
title = {A Tight High-Order Entropic Quantum Uncertainty Relation with Applications},
author = {Ivan Damg\r ard and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {360--378},
doi = {10.1007/978-3-540-74143-5_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1878,
title = {On Secure Multi-party Computation in Black-Box Groups},
author = {Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and Huaxiong Wang},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {591--612},
doi = {10.1007/978-3-540-74143-5_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1879,
title = {Cryptography in the Multi-string Model},
author = {Jens Groth and Rafail Ostrovsky},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {323--341},
doi = {10.1007/978-3-540-74143-5_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1880,
title = {Universally-Composable Two-Party Computation in Two Rounds},
author = {Omer Horvitz and Jonathan Katz},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {111--129},
doi = {10.1007/978-3-540-74143-5_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1881,
title = {Cryptography with Constant Input Locality},
author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {92--110},
doi = {10.1007/978-3-540-74143-5_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1882,
title = {Public Key Encryption That Allows PIR Queries},
author = {Dan Boneh and Eyal Kushilevitz and Rafail Ostrovsky and William E. Skeith III},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {50--67},
doi = {10.1007/978-3-540-74143-5_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1883,
title = {Simulatable VRFs with Applications to Multi-theorem NIZK},
author = {Melissa Chase and Anna Lysyanskaya},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {303--322},
doi = {10.1007/978-3-540-74143-5_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1884,
title = {Scalable and Unconditionally Secure Multiparty Computation},
author = {Ivan Damg\r ard and Jesper Buus Nielsen},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {572--590},
doi = {10.1007/978-3-540-74143-5_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1902,
title = {A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness},
author = {Emmanuel Bresson and Yassine Lakhnech and Laurent Mazar\'e and Bogdan Warinschi},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {482--499},
doi = {10.1007/978-3-540-74143-5_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1903,
title = {Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach},
author = {Jean-S\'ebastien Coron},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {379--394},
doi = {10.1007/978-3-540-74143-5_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1916,
title = {A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than *N* ^{0.073}},
author = {Ellen Jochemsz and Alexander May},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {395--411},
doi = {10.1007/978-3-540-74143-5_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1917,
title = {Hash Functions and the (Amplified) Boomerang Attack},
author = {Antoine Joux and Thomas Peyrin},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {244--263},
doi = {10.1007/978-3-540-74143-5_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1918,
title = {Pirate Evolution: How to Make the Most of Your Traitor Keys},
author = {Aggelos Kiayias and Serdar Pehlivanoglu},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {448--465},
doi = {10.1007/978-3-540-74143-5_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1919,
title = {Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5},
author = {Pierre-Alain Fouque and Ga\"etan Leurent and Phong Q. Nguyen},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {13--30},
doi = {10.1007/978-3-540-74143-5_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1920,
title = {How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?},
author = {Danny Harnik and Yuval Ishai and Eyal Kushilevitz},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {284--302},
doi = {10.1007/978-3-540-74143-5_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1921,
title = {Indistinguishability Amplification},
author = {Ueli M. Maurer and Krzysztof Pietrzak and Renato Renner},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {130--149},
doi = {10.1007/978-3-540-74143-5_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1922,
title = {Domain Extension of Public Random Functions: Beyond the Birthday Barrier},
author = {Ueli M. Maurer and Stefano Tessaro},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {187--204},
doi = {10.1007/978-3-540-74143-5_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1923,
title = {Random Oracles and Auxiliary Input},
author = {Dominique Unruh},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {205--223},
doi = {10.1007/978-3-540-74143-5_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1924,
title = {A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU},
author = {Nick Howgrave-Graham},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {150--169},
doi = {10.1007/978-3-540-74143-5_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1925,
title = {Reducing Trust in the PKG in Identity Based Cryptosystems},
author = {Vipul Goyal},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {430--447},
doi = {10.1007/978-3-540-74143-5_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1926,
title = {Chernoff-Type Direct Product Theorems},
author = {Russell Impagliazzo and Ragesh Jaiswal and Valentine Kabanets},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {500--516},
doi = {10.1007/978-3-540-74143-5_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1927,
title = {How Should We Solve Search Problems Privately?},
author = {Amos Beimel and Tal Malkin and Kobbi Nissim and Enav Weinreb},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {31--49},
doi = {10.1007/978-3-540-74143-5_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1928,
title = {A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator},
author = {Daniel R. L. Brown and Kristian Gj\osteen},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {466--481},
doi = {10.1007/978-3-540-74143-5_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{crypto-2007-1929,
title = {A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra},
author = {Ronald Cramer and Eike Kiltz and Carles Padr\'o},
booktitle = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
volume = {4622},
pages = {613--630},
doi = {10.1007/978-3-540-74143-5_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@proceedings{crypto-2007-1427,
title = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings},
booktitle = {CRYPTO},
volume = {4622},
url = {http://link.springer.com/book/10.1007/978-3-540-74143-5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2845,
title = {Non-interactive Proofs for Integer Multiplication},
author = {Ivan Damg\r ard and Rune Thorbek},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {412--429},
doi = {10.1007/978-3-540-72540-4_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2847,
title = {Ate Pairing on Hyperelliptic Curves},
author = {Robert Granger and Florian Hess and Roger Oyono and Nicolas Th\'eriault and Frederik Vercauteren},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {430--447},
doi = {10.1007/978-3-540-72540-4_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2849,
title = {A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security},
author = {Ueli M. Maurer and Johan Sj\"odin},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {498--516},
doi = {10.1007/978-3-540-72540-4_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2852,
title = {Universally Composable Multi-party Computation Using Tamper-Proof Hardware},
author = {Jonathan Katz},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {115--128},
doi = {10.1007/978-3-540-72540-4_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2854,
title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries},
author = {Yehuda Lindell and Benny Pinkas},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {52--78},
doi = {10.1007/978-3-540-72540-4_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@proceedings{eurocrypt-2007-2090,
title = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
booktitle = {EUROCRYPT},
volume = {4515},
url = {http://link.springer.com/book/10.1007/978-3-540-72540-4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2892,
title = {Divisible E-Cash Systems Can Be Truly Anonymous},
author = {S\'ebastien Canard and Aline Gouget},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {482--497},
doi = {10.1007/978-3-540-72540-4_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2893,
title = {Range Extension for Weak PRFs; The Good, the Bad, and the Ugly},
author = {Krzysztof Pietrzak and Johan Sj\"odin},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {517--533},
doi = {10.1007/978-3-540-72540-4_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2894,
title = {Secure Computation from Random Error Correcting Codes},
author = {Hao Chen and Ronald Cramer and Shafi Goldwasser and Robbert de Haan and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {291--310},
doi = {10.1007/978-3-540-72540-4_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2895,
title = {Atomic Secure Multi-party Multiplication with Low Communication},
author = {Ronald Cramer and Ivan Damg\r ard and Robbert de Haan},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {329--346},
doi = {10.1007/978-3-540-72540-4_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2896,
title = {Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit},
author = {Willi Geiselmann and Rainer Steinwandt},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {466--481},
doi = {10.1007/978-3-540-72540-4_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2897,
title = {Round-Efficient Secure Computation in Point-to-Point Networks},
author = {Jonathan Katz and Chiu-Yuen Koo},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {311--328},
doi = {10.1007/978-3-540-72540-4_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2898,
title = {Feistel Networks Made Public, and Applications},
author = {Yevgeniy Dodis and Prashant Puniya},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {534--554},
doi = {10.1007/978-3-540-72540-4_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2899,
title = {Cryptanalysis of SFLASH with Slightly Modified Parameters},
author = {Vivien Dubois and Pierre-Alain Fouque and Jacques Stern},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {264--275},
doi = {10.1007/978-3-540-72540-4_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2900,
title = {Ideal Multipartite Secret Sharing Schemes},
author = {Oriol Farr\`as and Jaume Mart\'\i-Farr\'e and Carles Padr\'o},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {448--465},
doi = {10.1007/978-3-540-72540-4_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2901,
title = {Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist},
author = {Krzysztof Pietrzak},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {23--33},
doi = {10.1007/978-3-540-72540-4_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2902,
title = {The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks},
author = {Thomas Ristenpart and Scott Yilek},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {228--245},
doi = {10.1007/978-3-540-72540-4_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2903,
title = {An *L* (1/3 + *epsilon* ) Algorithm for the Discrete Logarithm Problem for Low Degree Curves},
author = {Andreas Enge and Pierrick Gaudry},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {379--393},
doi = {10.1007/978-3-540-72540-4_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2904,
title = {Oblivious-Transfer Amplification},
author = {J\"urg Wullschleger},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {555--572},
doi = {10.1007/978-3-540-72540-4_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2905,
title = {Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model},
author = {Moti Yung and Yunlei Zhao},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {129--147},
doi = {10.1007/978-3-540-72540-4_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2906,
title = {Zero Knowledge and Soundness Are Symmetric},
author = {Shien Jin Ong and Salil P. Vadhan},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {187--209},
doi = {10.1007/978-3-540-72540-4_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2907,
title = {Efficient Two-Party Secure Computation on Committed Inputs},
author = {Stanislaw Jarecki and Vitaly Shmatikov},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {97--114},
doi = {10.1007/978-3-540-72540-4_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2908,
title = {Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities},
author = {Marc Stevens and Arjen K. Lenstra and Benne de Weger},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {1--22},
doi = {10.1007/978-3-540-72540-4_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2909,
title = {The Collision Intractability of MDC-2 in the Ideal-Cipher Model},
author = {John P. Steinberger},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {34--51},
doi = {10.1007/978-3-540-72540-4_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2910,
title = {Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility},
author = {Chun-Yuan Hsiao and Chi-Jen Lu and Leonid Reyzin},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {169--186},
doi = {10.1007/978-3-540-72540-4_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2911,
title = {Revisiting the Efficiency of Malicious Two-Party Computation},
author = {David P. Woodruff},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {79--96},
doi = {10.1007/978-3-540-72540-4_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2912,
title = {Cryptanalysis of the Sidelnikov Cryptosystem},
author = {Lorenz Minder and Amin Shokrollahi},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {347--360},
doi = {10.1007/978-3-540-72540-4_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2913,
title = {Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability},
author = {Yi Deng and Dongdai Lin},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {148--168},
doi = {10.1007/978-3-540-72540-4_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2914,
title = {Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables},
author = {Aur\'elie Bauer and Antoine Joux},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {361--378},
doi = {10.1007/978-3-540-72540-4_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2915,
title = {Mesh Signatures},
author = {Xavier Boyen},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {210--227},
doi = {10.1007/978-3-540-72540-4_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2916,
title = {General *Ad Hoc* Encryption from Exponent Inversion IBE},
author = {Xavier Boyen},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {394--411},
doi = {10.1007/978-3-540-72540-4_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2917,
title = {Batch Verification of Short Signatures},
author = {Jan Camenisch and Susan Hohenberger and Michael \Ostergaard Pedersen},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {246--263},
doi = {10.1007/978-3-540-72540-4_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2918,
title = {Simulatable Adaptive Oblivious Transfer},
author = {Jan Camenisch and Gregory Neven and Abhi Shelat},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {573--590},
doi = {10.1007/978-3-540-72540-4_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{eurocrypt-2007-2235,
title = {Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy},
author = {Hongjun Wu and Bart Preneel},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings},
volume = {4515},
pages = {276--290},
doi = {10.1007/978-3-540-72540-4_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@proceedings{fse-2007-3228,
title = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
booktitle = {FSE},
volume = {4593},
url = {http://link.springer.com/book/10.1007/978-3-540-74619-5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3229,
title = {Differential-Linear Attacks Against the Stream Cipher Phelix},
author = {Hongjun Wu and Bart Preneel},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {87--100},
doi = {10.1007/978-3-540-74619-5_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3257,
title = {On the Security of IV Dependent Stream Ciphers},
author = {C\^ome Berbain and Henri Gilbert},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {254--273},
doi = {10.1007/978-3-540-74619-5_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3258,
title = {Improved Slide Attacks},
author = {Eli Biham and Orr Dunkelman and Nathan Keller},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {153--166},
doi = {10.1007/978-3-540-74619-5_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3259,
title = {A New Attack on 6-Round IDEA},
author = {Eli Biham and Orr Dunkelman and Nathan Keller},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {211--224},
doi = {10.1007/978-3-540-74619-5_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3260,
title = {Generalized Correlation Analysis of Vectorial Boolean Functions},
author = {Claude Carlet and Khoongming Khoo and Chu-Wee Lim and Chuan-Wen Loe},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {382--398},
doi = {10.1007/978-3-540-74619-5_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3261,
title = {Producing Collisions for Panama, Instantaneously},
author = {Joan Daemen and Gilles Van Assche},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {1--18},
doi = {10.1007/978-3-540-74619-5_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3262,
title = {Bad and Good Ways of Post-processing Biased Physical Random Numbers},
author = {Markus Dichtl},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {137--152},
doi = {10.1007/978-3-540-74619-5_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3263,
title = {Improving the Security of MACs Via Randomized Message Preprocessing},
author = {Yevgeniy Dodis and Krzysztof Pietrzak},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {414--433},
doi = {10.1007/978-3-540-74619-5_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3264,
title = {Two General Attacks on Pomaranch-Like Keystream Generators},
author = {H\r akan Englund and Martin Hell and Thomas Johansson},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {274--289},
doi = {10.1007/978-3-540-74619-5_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3265,
title = {Perfect Block Ciphers with Small Blocks},
author = {Louis Granboulan and Thomas Pornin},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {452--465},
doi = {10.1007/978-3-540-74619-5_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3266,
title = {Overtaking VEST},
author = {Antoine Joux and Jean-Ren\'e Reinhard},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {58--72},
doi = {10.1007/978-3-540-74619-5_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3267,
title = {A New Class of Weak Keys for Blowfish},
author = {Orhun Kara and Cevat Manap},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {167--180},
doi = {10.1007/978-3-540-74619-5_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3268,
title = {Related-Key Rectangle Attacks on Reduced AES-192 and AES-256},
author = {Jongsung Kim and Seokhie Hong and Bart Preneel},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {225--241},
doi = {10.1007/978-3-540-74619-5_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3269,
title = {The Grindahl Hash Functions},
author = {Lars R. Knudsen and Christian Rechberger and S\oren S. Thomsen},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {39--57},
doi = {10.1007/978-3-540-74619-5_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3270,
title = {New Lightweight DES Variants},
author = {Gregor Leander and Christof Paar and Axel Poschmann and Kai Schramm},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {196--210},
doi = {10.1007/978-3-540-74619-5_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3271,
title = {Message Freedom in MD4 and MD5 Collisions: Application to APOP},
author = {Ga\"etan Leurent},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {309--328},
doi = {10.1007/978-3-540-74619-5_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3272,
title = {An Analysis of XSL Applied to BES},
author = {Chu-Wee Lim and Khoongming Khoo},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {242--253},
doi = {10.1007/978-3-540-74619-5_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3273,
title = {Cryptanalysis of FORK-256},
author = {Krystian Matusiewicz and Thomas Peyrin and Olivier Billet and Scott Contini and Josef Pieprzyk},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {19--38},
doi = {10.1007/978-3-540-74619-5_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3274,
title = {New Bounds for PMAC, TMAC, and XCBC},
author = {Kazuhiko Minematsu and Toshiyasu Matsushima},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {434--451},
doi = {10.1007/978-3-540-74619-5_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3275,
title = {Cryptanalysis of Achterbahn-128/80},
author = {Mar\'\ia Naya-Plasencia},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {73--86},
doi = {10.1007/978-3-540-74619-5_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3276,
title = {How to Enrich the Message Space of a Cipher},
author = {Thomas Ristenpart and Phillip Rogaway},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {101--118},
doi = {10.1007/978-3-540-74619-5_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3277,
title = {New Message Difference for MD4},
author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {329--348},
doi = {10.1007/978-3-540-74619-5_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3278,
title = {Security Analysis of Constructions Combining FIL Random Oracles},
author = {Yannick Seurin and Thomas Peyrin},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {119--136},
doi = {10.1007/978-3-540-74619-5_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3279,
title = {The 128-Bit Blockcipher CLEFIA (Extended Abstract)},
author = {Taizo Shirai and Kyoji Shibutani and Toru Akishita and Shiho Moriai and Tetsu Iwata},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {181--195},
doi = {10.1007/978-3-540-74619-5_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3280,
title = {Algebraic Cryptanalysis of 58-Round SHA-1},
author = {Makoto Sugita and Mitsuru Kawazoe and Ludovic Perret and Hideki Imai},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {349--365},
doi = {10.1007/978-3-540-74619-5_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3281,
title = {An Analytical Model for Time-Driven Cache Attacks},
author = {Kris Tiri and Onur Acii\c cmez and Michael Neve and Flemming Andersen},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {399--413},
doi = {10.1007/978-3-540-74619-5_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3282,
title = {Analysis of},
author = {Bo-Yin Yang and Owen Chia-Hsin Chen and Daniel J. Bernstein and Jiun-Ming Chen},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {290--308},
doi = {10.1007/978-3-540-74619-5_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{fse-2007-3283,
title = {Algebraic Immunity of S-Boxes and Augmented Functions},
author = {Simon Fischer and Willi Meier},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
volume = {4593},
pages = {366--381},
doi = {10.1007/978-3-540-74619-5_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@article{jofc-2007-14261,
title = {Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1},
author = {Boaz Tsaban},
journal = {J. Cryptology},
volume = {20},
pages = {389--392},
doi = {10.1007/s00145-007-0564-4},
year = {2007}
}
@article{jofc-2007-14283,
title = {Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)},
author = {Mart\'\in Abadi and Phillip Rogaway},
journal = {J. Cryptology},
volume = {20},
pages = {395},
doi = {10.1007/s00145-007-0203-0},
year = {2007}
}
@article{jofc-2007-14307,
title = {Hierarchical Threshold Secret Sharing},
author = {Tamir Tassa},
journal = {J. Cryptology},
volume = {20},
pages = {237--264},
doi = {10.1007/s00145-006-0334-8},
year = {2007}
}
@article{jofc-2007-14309,
title = {Secure Distributed Key Generation for Discrete-Log Based Cryptosystems},
author = {Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin},
journal = {J. Cryptology},
volume = {20},
pages = {51--83},
doi = {10.1007/s00145-006-0347-3},
year = {2007}
}
@article{jofc-2007-14311,
title = {Primality Proving via One Round in ECPP and One Iteration in AKS},
author = {Qi Cheng},
journal = {J. Cryptology},
volume = {20},
pages = {375--387},
doi = {10.1007/s00145-006-0406-9},
year = {2007}
}
@article{jofc-2007-14313,
title = {The Security of the IAPM and IACBC Modes},
author = {Johan H\r astad},
journal = {J. Cryptology},
volume = {20},
pages = {153--163},
doi = {10.1007/s00145-006-0225-z},
year = {2007}
}
@article{jofc-2007-14315,
title = {Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring},
author = {Jean-S\'ebastien Coron and Alexander May},
journal = {J. Cryptology},
volume = {20},
pages = {39--50},
doi = {10.1007/s00145-006-0433-6},
year = {2007}
}
@article{jofc-2007-14317,
title = {Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication},
author = {Dario Catalano and David Pointcheval and Thomas Pornin},
journal = {J. Cryptology},
volume = {20},
pages = {115--149},
doi = {10.1007/s00145-006-0431-8},
year = {2007}
}
@article{jofc-2007-14319,
title = {On Unconditionally Secure Distributed Oblivious Transfer},
author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Douglas R. Stinson},
journal = {J. Cryptology},
volume = {20},
pages = {323--373},
doi = {10.1007/s00145-007-0327-2},
year = {2007}
}
@article{jofc-2007-14321,
title = {Robust Information-Theoretic Private Information Retrieval},
author = {Amos Beimel and Yoav Stahl},
journal = {J. Cryptology},
volume = {20},
pages = {295--321},
doi = {10.1007/s00145-007-0424-2},
year = {2007}
}
@article{jofc-2007-14323,
title = {Constant-Round Oblivious Transfer in the Bounded Storage Model},
author = {Yan Zong Ding and Danny Harnik and Alon Rosen and Ronen Shaltiel},
journal = {J. Cryptology},
volume = {20},
pages = {165--202},
doi = {10.1007/s00145-006-0438-1},
year = {2007}
}
@article{jofc-2007-14325,
title = {Formal Proofs for the Security of Signcryption},
author = {Joonsang Baek and Ron Steinfeld and Yuliang Zheng},
journal = {J. Cryptology},
volume = {20},
pages = {203--235},
doi = {10.1007/s00145-007-0211-0},
year = {2007}
}
@article{jofc-2007-14327,
title = {Robust and Efficient Sharing of RSA Functions},
author = {Rosario Gennaro and Tal Rabin and Stanislaw Jarecki and Hugo Krawczyk},
journal = {J. Cryptology},
volume = {20},
pages = {393},
doi = {10.1007/s00145-007-0201-2},
year = {2007}
}
@article{jofc-2007-14329,
title = {Scalable Protocols for Authenticated Group Key Exchange},
author = {Jonathan Katz and Moti Yung},
journal = {J. Cryptology},
volume = {20},
pages = {85--113},
doi = {10.1007/s00145-006-0361-5},
year = {2007}
}
@article{jofc-2007-14331,
title = {Another Look at 'Provable Security'},
author = {Neal Koblitz and Alfred Menezes},
journal = {J. Cryptology},
volume = {20},
pages = {3--37},
doi = {10.1007/s00145-005-0432-z},
year = {2007}
}
@article{jofc-2007-14333,
title = {RSA-Based Undeniable Signatures},
author = {Rosario Gennaro and Tal Rabin and Hugo Krawczyk},
journal = {J. Cryptology},
volume = {20},
pages = {394},
doi = {10.1007/s00145-007-0202-1},
year = {2007}
}
@article{jofc-2007-14335,
title = {A Forward-Secure Public-Key Encryption Scheme},
author = {Ran Canetti and Shai Halevi and Jonathan Katz},
journal = {J. Cryptology},
volume = {20},
pages = {265--294},
doi = {10.1007/s00145-006-0442-5},
year = {2007}
}
@proceedings{pkc-2007-3385,
title = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
booktitle = {PKC},
volume = {4450},
url = {http://link.springer.com/book/10.1007/978-3-540-71677-8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3405,
title = {A Direct Anonymous Attestation Scheme for Embedded Devices},
author = {He Ge and Stephen R. Tate},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {16--30},
doi = {10.1007/978-3-540-71677-8_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3550,
title = {Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003},
author = {Daewan Han and Myung-Hwan Kim and Yongjin Yeom},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {107--117},
doi = {10.1007/978-3-540-71677-8_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3551,
title = {Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman},
author = {Eike Kiltz},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {282--297},
doi = {10.1007/978-3-540-71677-8_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3552,
title = {Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures},
author = {Huafei Zhu and Willy Susilo and Yi Mu},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {134--149},
doi = {10.1007/978-3-540-71677-8_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3553,
title = {Self-Generated-Certificate Public Key Encryption Without Pairing},
author = {Junzuo Lai and Weidong Kou},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {476--489},
doi = {10.1007/978-3-540-71677-8_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3554,
title = {Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol},
author = {Takashi Nishide and Kazuo Ohta},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {343--360},
doi = {10.1007/978-3-540-71677-8_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3555,
title = {A Survey of Single-Database Private Information Retrieval: Techniques and Applications},
author = {Rafail Ostrovsky and William E. Skeith III},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {393--411},
doi = {10.1007/978-3-540-71677-8_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3556,
title = {Parallel Key-Insulated Public Key Encryption Without Random Oracles},
author = {Beno\^\it Libert and Jean-Jacques Quisquater and Moti Yung},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {298--314},
doi = {10.1007/978-3-540-71677-8_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3557,
title = {Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol},
author = {Alex D. Myasnikov and Alexander Ushakov},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {76--88},
doi = {10.1007/978-3-540-71677-8_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3558,
title = {Verifiable Shuffle of Large Size Ciphertexts},
author = {Jens Groth and Steve Lu},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {377--392},
doi = {10.1007/978-3-540-71677-8_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3559,
title = {Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA},
author = {Noboru Kunihiro and Kaoru Kurosawa},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {412--425},
doi = {10.1007/978-3-540-71677-8_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3560,
title = {Efficient Ring Signatures Without Random Oracles},
author = {Hovav Shacham and Brent Waters},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {166--180},
doi = {10.1007/978-3-540-71677-8_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3561,
title = {On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures},
author = {Guilin Wang and Joonsang Baek and Duncan S. Wong and Feng Bao},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {43--60},
doi = {10.1007/978-3-540-71677-8_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3562,
title = {Identity-Based Traitor Tracing},
author = {Michel Abdalla and Alexander W. Dent and John Malone-Lee and Gregory Neven and Duong Hieu Phan and Nigel P. Smart},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {361--376},
doi = {10.1007/978-3-540-71677-8_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3563,
title = {Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles},
author = {Mihir Bellare and Sarah Shoup},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {201--216},
doi = {10.1007/978-3-540-71677-8_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3564,
title = {A Closer Look at PKI: Security and Efficiency},
author = {Alexandra Boldyreva and Marc Fischlin and Adriana Palacio and Bogdan Warinschi},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {458--475},
doi = {10.1007/978-3-540-71677-8_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3565,
title = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures},
author = {Xavier Boyen and Brent Waters},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {1--15},
doi = {10.1007/978-3-540-71677-8_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3566,
title = {Improved On-Line/Off-Line Threshold Signatures},
author = {Emmanuel Bresson and Dario Catalano and Rosario Gennaro},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {217--232},
doi = {10.1007/978-3-540-71677-8_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3567,
title = {Knowledge-Binding Commitments with Applications in Time-Stamping},
author = {Ahto Buldas and Sven Laur},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {150--165},
doi = {10.1007/978-3-540-71677-8_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3568,
title = {Fast Batch Verification of Multiple Signatures},
author = {Jung Hee Cheon and Jeong Hyun Yi},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {442--457},
doi = {10.1007/978-3-540-71677-8_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3569,
title = {High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems},
author = {Jintai Ding and Lei Hu and Xuyun Nie and Jianyu Li and John Wagner},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {233--248},
doi = {10.1007/978-3-540-71677-8_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3570,
title = {*l*-Invertible Cycles for *M*ultivariate *Q*uadratic (*MQ*) Public Key Cryptography},
author = {Jintai Ding and Christopher Wolf and Bo-Yin Yang},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {266--281},
doi = {10.1007/978-3-540-71677-8_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3571,
title = {Optimistic Fair Exchange in a Multi-user Setting},
author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {118--133},
doi = {10.1007/978-3-540-71677-8_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3572,
title = {Cryptanalysis of HFE with Internal Perturbation},
author = {Vivien Dubois and Louis Granboulan and Jacques Stern},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {249--265},
doi = {10.1007/978-3-540-71677-8_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3573,
title = {Efficient Pseudorandom Generators Based on the DDH Assumption},
author = {Reza Rezaeian Farashahi and Berry Schoenmakers and Andrey Sidorenko},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {426--441},
doi = {10.1007/978-3-540-71677-8_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3574,
title = {Anonymous Signatures Made Easy},
author = {Marc Fischlin},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {31--42},
doi = {10.1007/978-3-540-71677-8_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3575,
title = {Traceable Ring Signature},
author = {Eiichiro Fujisaki and Koutarou Suzuki},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {181--200},
doi = {10.1007/978-3-540-71677-8_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3576,
title = {New Chosen-Ciphertext Attacks on NTRU},
author = {Nicolas Gama and Phong Q. Nguyen},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {89--106},
doi = {10.1007/978-3-540-71677-8_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3577,
title = {Practical and Secure Solutions for Integer Comparison},
author = {Juan A. Garay and Berry Schoenmakers and Jos\'e Villegas},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {330--342},
doi = {10.1007/978-3-540-71677-8_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3578,
title = {Multi-bit Cryptosystems Based on Lattice Problems},
author = {Akinori Kawachi and Keisuke Tanaka and Keita Xagawa},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {315--329},
doi = {10.1007/978-3-540-71677-8_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{pkc-2007-3579,
title = {Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions},
author = {Dima Ruinskiy and Adi Shamir and Boaz Tsaban},
booktitle = {Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings},
volume = {4450},
pages = {61--75},
doi = {10.1007/978-3-540-71677-8_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3623,
title = {Towards Optimal and Efficient Perfectly Secure Message Transmission},
author = {Matthias Fitzi and Matthew K. Franklin and Juan A. Garay and S. Harsha Vardhan},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {311--322},
doi = {10.1007/978-3-540-70936-7_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3625,
title = {On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits},
author = {Oded Goldreich},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {174--193},
doi = {10.1007/978-3-540-70936-7_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3627,
title = {Perfect NIZK with Adaptive Soundness},
author = {Masayuki Abe and Serge Fehr},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {118--136},
doi = {10.1007/978-3-540-70936-7_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3629,
title = {How to Shuffle in Public},
author = {Ben Adida and Douglas Wikstr\"om},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {555--574},
doi = {10.1007/978-3-540-70936-7_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3631,
title = {Weakly-Private Secret Sharing Schemes},
author = {Amos Beimel and Matthew K. Franklin},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {253--272},
doi = {10.1007/978-3-540-70936-7_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3633,
title = {Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries},
author = {Yonatan Aumann and Yehuda Lindell},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {137--156},
doi = {10.1007/978-3-540-70936-7_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3635,
title = {Universally Composable Security with Global Setup},
author = {Ran Canetti and Yevgeniy Dodis and Rafael Pass and Shabsi Walfish},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {61--85},
doi = {10.1007/978-3-540-70936-7_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3637,
title = {Lower Bounds for Non-interactive Zero-Knowledge},
author = {Hoeteck Wee},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {103--117},
doi = {10.1007/978-3-540-70936-7_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3639,
title = {On Secret Sharing Schemes, Matroids and Polymatroids},
author = {Jaume Mart\'\i-Farr\'e and Carles Padr\'o},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {273--290},
doi = {10.1007/978-3-540-70936-7_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3641,
title = {Intrusion-Resilient Key Exchange in the Bounded Retrieval Model},
author = {David Cash and Yan Zong Ding and Yevgeniy Dodis and Wenke Lee and Richard J. Lipton and Shabsi Walfish},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {479--498},
doi = {10.1007/978-3-540-70936-7_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3643,
title = {Conjunctive, Subset, and Range Queries on Encrypted Data},
author = {Dan Boneh and Brent Waters},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {535--554},
doi = {10.1007/978-3-540-70936-7_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3645,
title = {Multi-authority Attribute Based Encryption},
author = {Melissa Chase},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {515--534},
doi = {10.1007/978-3-540-70936-7_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3647,
title = {Unifying Classical and Quantum Key Distillation},
author = {Matthias Christandl and Artur Ekert and Michal Horodecki and Pawel Horodecki and Jonathan Oppenheim and Renato Renner},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {456--478},
doi = {10.1007/978-3-540-70936-7_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3649,
title = {Designated Confirmer Signatures Revisited},
author = {Douglas Wikstr\"om},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {342--361},
doi = {10.1007/978-3-540-70936-7_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3651,
title = {Towards a Separation of Semantic and CCA Security for Public Key Encryption},
author = {Yael Gertner and Tal Malkin and Steven Myers},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {434--455},
doi = {10.1007/978-3-540-70936-7_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3653,
title = {On the Necessity of Rewinding in Secure Multiparty Computation},
author = {Michael Backes and J\"orn M\"uller-Quade and Dominique Unruh},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {157--173},
doi = {10.1007/978-3-540-70936-7_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3655,
title = {Long-Term Security and Universal Composability},
author = {J\"orn M\"uller-Quade and Dominique Unruh},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {41--60},
doi = {10.1007/978-3-540-70936-7_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3658,
title = {Parallel Repetition of Computationally Sound Protocols Revisited},
author = {Krzysztof Pietrzak and Douglas Wikstr\"om},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {86--102},
doi = {10.1007/978-3-540-70936-7_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3660,
title = {Obfuscation for Cryptographic Purposes},
author = {Dennis Hofheinz and John Malone-Lee and Martijn Stam},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {214--232},
doi = {10.1007/978-3-540-70936-7_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3662,
title = {Evaluating Branching Programs on Encrypted Data},
author = {Yuval Ishai and Anat Paskin},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {575--594},
doi = {10.1007/978-3-540-70936-7_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3664,
title = {Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions},
author = {Carmit Hazay and Jonathan Katz and Chiu-Yuen Koo and Yehuda Lindell},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {323--341},
doi = {10.1007/978-3-540-70936-7_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3666,
title = {Does Privacy Require True Randomness?},
author = {Carl Bosley and Yevgeniy Dodis},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {1--20},
doi = {10.1007/978-3-540-70936-7_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3668,
title = {Tackling Adaptive Corruptions in Multicast Encryption Protocols},
author = {Saurabh Panjwani},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {21--40},
doi = {10.1007/978-3-540-70936-7_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3671,
title = {Private Approximation of Clustering and Vertex Cover},
author = {Amos Beimel and Renen Hallak and Kobbi Nissim},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {383--403},
doi = {10.1007/978-3-540-70936-7_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3673,
title = {Secure Linear Algebra Using Linearly Recurrent Sequences},
author = {Eike Kiltz and Payman Mohassel and Enav Weinreb and Matthew K. Franklin},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {291--310},
doi = {10.1007/978-3-540-70936-7_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3675,
title = {On Best-Possible Obfuscation},
author = {Shafi Goldwasser and Guy N. Rothblum},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {194--213},
doi = {10.1007/978-3-540-70936-7_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3679,
title = {From Weak to Strong Watermarking},
author = {Nicholas Hopper and David Molnar and David Wagner},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {362--382},
doi = {10.1007/978-3-540-70936-7_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3681,
title = {Robuster Combiners for Oblivious Transfer},
author = {Remo Meier and Bartosz Przydatek and J\"urg Wullschleger},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {404--418},
doi = {10.1007/978-3-540-70936-7_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3683,
title = {Securely Obfuscating Re-encryption},
author = {Susan Hohenberger and Guy N. Rothblum and Abhi Shelat and Vinod Vaikuntanathan},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {233--252},
doi = {10.1007/978-3-540-70936-7_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3685,
title = {One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments},
author = {Hoeteck Wee},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {419--433},
doi = {10.1007/978-3-540-70936-7_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{tcc-2007-3687,
title = {(Password) Authenticated Key Establishment: From 2-Party to Group},
author = {Michel Abdalla and Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt},
booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
volume = {4392},
pages = {499--514},
doi = {10.1007/978-3-540-70936-7_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@proceedings{tcc-2007-3702,
title = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
booktitle = {TCC},
volume = {4392},
url = {http://link.springer.com/book/10.1007/978-3-540-70936-7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2007}
}
@inproceedings{asiacrypt-2006-5,
title = {Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions},
author = {Scott Contini and Yiqun Lisa Yin},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {37--53},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840037/42840037.pdf},
doi = {10.1007/11935230_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-519,
title = {Relationship Between Standard Model Plaintext Awareness and Message Hiding},
author = {Isamu Teranishi and Wakaha Ogata},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {226--240},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840225/42840225.pdf},
doi = {10.1007/11935230_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-33,
title = {New Cryptanalytic Results on IDEA},
author = {Eli Biham and Orr Dunkelman and Nathan Keller},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {412--427},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840416/42840416.pdf},
doi = {10.1007/11935230_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-34,
title = {A Scalable Password-Based Group Key Exchange Protocol in the Standard Model},
author = {Michel Abdalla and David Pointcheval},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {332--347},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840334/42840334.pdf},
doi = {10.1007/11935230_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-301,
title = {New Approach for Selectively Convertible Undeniable Signature Schemes},
author = {Kaoru Kurosawa and Tsuyoshi Takagi},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {428--443},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840433/42840433.pdf},
doi = {10.1007/11935230_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-566,
title = {New Guess-and-Determine Attack on the Self-Shrinking Generator},
author = {Bin Zhang and Dengguo Feng},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {54--68},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840053/42840053.pdf},
doi = {10.1007/11935230_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-320,
title = {On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms},
author = {Gregor Leander and Andy Rupp},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {241--251},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840239/42840239.pdf},
doi = {10.1007/11935230_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-321,
title = {A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols},
author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {348--363},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840350/42840350.pdf},
doi = {10.1007/11935230_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-73,
title = {Finding SHA-1 Characteristics: General Results and Applications},
author = {Christophe De Canni\`ere and Christian Rechberger},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {1--20},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840001/42840001.pdf},
doi = {10.1007/11935230_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-331,
title = {Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution},
author = {Satoshi Obana and Toshinori Araki},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {364--379},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840366/42840366.pdf},
doi = {10.1007/11935230_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-77,
title = {Analysis of One Popular Group Signature Scheme},
author = {Zhengjun Cao},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {460--466},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840465/42840465.pdf},
doi = {10.1007/11935230_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-84,
title = {Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys},
author = {Nuttapong Attrapadung and Jun Furukawa and Hideki Imai},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {161--177},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840161/42840161.pdf},
doi = {10.1007/11935230_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-341,
title = {Secure Sketch for Biometric Templates},
author = {Qiming Li and Yagiz Sutcu and Nasir D. Memon},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {99--113},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840099/42840099.pdf},
doi = {10.1007/11935230_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-89,
title = {Construction and Analysis of Boolean Functions of 2*t*+1 Variables with Maximum Algebraic Immunity},
author = {Na Li and Wen-Feng Qi},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {84--98},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840084/42840084.pdf},
doi = {10.1007/11935230_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-92,
title = {Extending Scalar Multiplication Using Double Bases},
author = {Roberto Maria Avanzi and Vassil Dimitrov and Christophe Doche and Francesco Sica},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {130--144},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840129/42840129.pdf},
doi = {10.1007/11935230_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-96,
title = {KFC - The Krazy Feistel Cipher},
author = {Thomas Baign\`eres and Matthieu Finiasz},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {380--395},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840384/42840384.pdf},
doi = {10.1007/11935230_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-364,
title = {Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption},
author = {Pascal Paillier and Jorge Luis Villar},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {252--266},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840253/42840253.pdf},
doi = {10.1007/11935230_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-117,
title = {Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding},
author = {Donghoon Chang and Sangjin Lee and Mridul Nandi and Moti Yung},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {283--298},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840286/42840286.pdf},
doi = {10.1007/11935230_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-379,
title = {Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions},
author = {Jacques Patarin and Val\'erie Nachef and C\^ome Berbain},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {396--411},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840400/42840400.pdf},
doi = {10.1007/11935230_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-381,
title = {On the (In)security of Stream Ciphers Based on Arrays and Modular Addition},
author = {Souradyuti Paul and Bart Preneel},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {69--83},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840068/42840068.pdf},
doi = {10.1007/11935230_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-126,
title = {Multi-Property-Preserving Hash Domain Extension and the EMD Transform},
author = {Mihir Bellare and Thomas Ristenpart},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {299--314},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840301/42840301.pdf},
doi = {10.1007/11935230_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-383,
title = {Combining Compression Functions and Block Cipher-Based Hash Functions},
author = {Thomas Peyrin and Henri Gilbert and Fr\'ed\'eric Muller and Matthew J. B. Robshaw},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {315--331},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840317/42840317.pdf},
doi = {10.1007/11935230_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-129,
title = {HIBE With Short Public Parameters Without Random Oracle},
author = {Sanjit Chatterjee and Palash Sarkar},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {145--160},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840145/42840145.pdf},
doi = {10.1007/11935230_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-142,
title = {On the Security of OAEP},
author = {Alexandra Boldyreva and Marc Fischlin},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {210--225},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840209/42840209.pdf},
doi = {10.1007/11935230_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@proceedings{asiacrypt-2006-23713,
title = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings},
author = {Xuejia Lai and Kefei Chen},
booktitle = {ASIACRYPT},
volume = {4284},
url = {http://link.springer.com/book/10.1007/11935230},
doi = {10.1007/11935230},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-451,
title = {Improved Collision Search for SHA-0},
author = {Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {21--36},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840021/42840021.pdf},
doi = {10.1007/11935230_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-200,
title = {On the Generic Construction of Identity-Based Signatures with Additional Properties},
author = {David Galindo and Javier Herranz and Eike Kiltz},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {178--193},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840177/42840177.pdf},
doi = {10.1007/11935230_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-206,
title = {The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography},
author = {Pierrick Gaudry and T. Houtmann and D. Kohel and Christophe Ritzenthaler and A. Weng},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {114--129},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840113/42840113.pdf},
doi = {10.1007/11935230_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-219,
title = {A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants},
author = {Ellen Jochemsz and Alexander May},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {267--282},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840270/42840270.pdf},
doi = {10.1007/11935230_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-240,
title = {Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures},
author = {Jens Groth},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {444--459},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840449/42840449.pdf},
doi = {10.1007/11935230_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2006-499,
title = {On the Provable Security of an Efficient RSA-Based Pseudorandom Generator},
author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security},
volume = {4284},
pages = {194--209},
url = {http://www.iacr.org/cryptodb/archive/2006/ASIACRYPT/42840193/42840193.pdf},
doi = {10.1007/11935230_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-810,
title = {Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations},
author = {Stefan Mangard and Kai Schramm},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {76--90},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/07/07.pdf},
doi = {10.1007/11894063_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-811,
title = {Optically Enhanced Position-Locked Power Analysis},
author = {Sergei P. Skorobogatov},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {61--75},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/06/06.pdf},
doi = {10.1007/11894063_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-812,
title = {Read-Proof Hardware from Protective Coatings},
author = {Pim Tuyls and Geert Jan Schrijen and Boris Skoric and Jan van Geloven and Nynke Verhaegh and Rob Wolters},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {369--383},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/29/29.pdf},
doi = {10.1007/11894063_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-814,
title = {A Generalized Method of Differential Fault Attack Against AES Cryptosystem},
author = {Amir Moradi and Mohammad T. Manzuri Shalmani and Mahmoud Salmasizadeh},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {91--100},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/08/08.pdf},
doi = {10.1007/11894063_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-815,
title = {Offline Hardware/Software Authentication for Reconfigurable Platforms},
author = {Eric Simpson and Patrick Schaumont},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {311--323},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/25/25.pdf},
doi = {10.1007/11894063_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-817,
title = {Towards Security Limits in Side-Channel Attacks},
author = {Fran\c cois-Xavier Standaert and Eric Peeters and C\'edric Archambeau and Jean-Jacques Quisquater},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {30--45},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/03/03.pdf},
doi = {10.1007/11894063_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-819,
title = {The Outer Limits of RFID Security},
author = {Ari Juels},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {231},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/18/18.pdf},
doi = {10.1007/11894063_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-820,
title = {Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors},
author = {Stefan Tillich and Johann Gro\sssch\"adl},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {270--284},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/22/22.pdf},
doi = {10.1007/11894063_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-823,
title = {Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller},
author = {Manuel Koschuch and Joachim Lechner and Andreas Weitzer and Johann Gro\sssch\"adl and Alexander Szekely and Stefan Tillich and Johannes Wolkerstorfer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {430--444},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/34/34.pdf},
doi = {10.1007/11894063_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-825,
title = {Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker},
author = {Sandeep Kumar and Christof Paar and Jan Pelzl and Gerd Pfeiffer and Manfred Schimmler},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {101--118},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/09/09.pdf},
doi = {10.1007/11894063_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-826,
title = {A Proposition for Correlation Power Analysis Enhancement},
author = {Thanh-Ha Le and Jessy Cl\'edi\`ere and C\'ecile Canovas and Bruno Robisson and Christine Servi\`ere and Jean-Louis Lacoume},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {174--186},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/14/14.pdf},
doi = {10.1007/11894063_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-827,
title = {Provably Secure S-Box Implementation Based on Fourier Transform},
author = {Emmanuel Prouff and Christophe Giraud and S\'ebastien Aum\^onier},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {216--230},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/17/17.pdf},
doi = {10.1007/11894063_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-828,
title = {Unified Point Addition Formul\ae and Side-Channel Attacks},
author = {Douglas Stebila and Nicolas Th\'eriault},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {354--368},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/28/28.pdf},
doi = {10.1007/11894063_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-830,
title = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography},
author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {415--429},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/33/33.pdf},
doi = {10.1007/11894063_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-833,
title = {Challenges for Trusted Computing},
author = {Ahmad-Reza Sadeghi},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {414},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/32/32.pdf},
doi = {10.1007/11894063_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-834,
title = {Implementing Cryptographic Pairings on Smartcards},
author = {Michael Scott and Neil Costigan and Wesam Abdulwahab},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {134--147},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/11/11.pdf},
doi = {10.1007/11894063_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-837,
title = {Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks},
author = {Konrad J. Kulikowski and Alexander Smirnov and Alexander Taubin},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {399--413},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/31/31.pdf},
doi = {10.1007/11894063_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-839,
title = {NanoCMOS-Molecular Realization of Rijndael},
author = {Massoud Masoumi and Farshid Raissi and Mahmoud Ahmadian},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {285--297},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/23/23.pdf},
doi = {10.1007/11894063_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-840,
title = {Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style},
author = {Daisuke Suzuki and Minoru Saeki},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {255--269},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/21/21.pdf},
doi = {10.1007/11894063_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-841,
title = {HIGHT: A New Block Cipher Suitable for Low-Resource Device},
author = {Deukjo Hong and Jaechul Sung and Seokhie Hong and Jongin Lim and Sangjin Lee and Bonseok Koo and Changhoon Lee and Donghoon Chang and Jesang Lee and Kitae Jeong and Hyun Kim and Jongsung Kim and Seongtaek Chee},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {46--59},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/04/04.pdf},
doi = {10.1007/11894063_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-845,
title = {SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form},
author = {Toru Akishita and Masanobu Katagi and Izuru Kitamura},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {148--159},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/12/12.pdf},
doi = {10.1007/11894063_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-847,
title = {Integer Factoring Utilizing PC Cluster},
author = {Kazumaro Aoki},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {60},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/05/05.pdf},
doi = {10.1007/11894063_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-849,
title = {Template Attacks in Principal Subspaces},
author = {C\'edric Archambeau and Eric Peeters and Fran\c cois-Xavier Standaert and Jean-Jacques Quisquater},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {1--14},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/01/01.pdf},
doi = {10.1007/11894063_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-851,
title = {Cache-Collision Timing Attacks Against AES},
author = {Joseph Bonneau and Ilya Mironov},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {201--215},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/16/16.pdf},
doi = {10.1007/11894063_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-853,
title = {Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits},
author = {G. Fraidy Bouesse and Gilles Sicard and Marc Renaudin},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {384--398},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/30/30.pdf},
doi = {10.1007/11894063_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-855,
title = {Why One Should Also Secure RSA Public Key Elements},
author = {Eric Brier and Beno\^\it Chevallier-Mames and Mathieu Ciet and Christophe Clavier},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {324--338},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/26/26.pdf},
doi = {10.1007/11894063_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-857,
title = {Three-Phase Dual-Rail Pre-charge Logic},
author = {Marco Bucci and Luca Giancane and Raimondo Luzzi and Alessandro Trifiletti},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {232--241},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/19/19.pdf},
doi = {10.1007/11894063_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-859,
title = {Improving SHA-2 Hardware Implementations},
author = {Ricardo Chaves and Georgi Kuzmanov and Leonel Sousa and Stamatis Vassiliadis},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {298--310},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/24/24.pdf},
doi = {10.1007/11894063_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-861,
title = {Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage},
author = {Zhimin Chen and Yujie Zhou},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {242--254},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/20/20.pdf},
doi = {10.1007/11894063_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-863,
title = {FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers},
author = {V. S. Dimitrov and Kimmo U. J\"arvinen and M. J. Jacobson and W. F. Chan and Z. Huang},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {445--459},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/35/35.pdf},
doi = {10.1007/11894063_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-865,
title = {Power Attack on Small RSA Public Exponent},
author = {Pierre-Alain Fouque and S\'ebastien Kunz-Jacques and Gwena\"elle Martinet and Fr\'ed\'eric Muller and Fr\'ed\'eric Valette},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {339--353},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/27/27.pdf},
doi = {10.1007/11894063_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-867,
title = {Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware},
author = {Kris Gaj and Soonhak Kwon and Patrick Baier and Paul Kohlbrenner and Hoang Le and Mohammed Khaleeluddin and Ramakrishna Bachimanchi},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {119--133},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/10/10.pdf},
doi = {10.1007/11894063_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-869,
title = {Templates vs. Stochastic Methods},
author = {Benedikt Gierlichs and Kerstin Lemke-Rust and Christof Paar},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {15--29},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/02/02.pdf},
doi = {10.1007/11894063_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-871,
title = {High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching},
author = {Naofumi Homma and Sei Nagashima and Yuichi Imai and Takafumi Aoki and Akashi Satoh},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {187--200},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/15/15.pdf},
doi = {10.1007/11894063_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{ches-2006-873,
title = {Fast Generation of Prime Numbers on Portable Devices: An Update},
author = {Marc Joye and Pascal Paillier},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop},
volume = {4249},
pages = {160--173},
url = {http://www.iacr.org/cryptodb/archive/2006/CHES/13/13.pdf},
doi = {10.1007/11894063_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@proceedings{ches-2006-23715,
title = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
author = {Louis Goubin and Mitsuru Matsui},
booktitle = {CHES},
volume = {4249},
url = {http://link.springer.com/book/10.1007/11894063},
doi = {10.1007/11894063},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1865,
title = {Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models},
author = {Moni Naor and Gil Segev and Adam Smith},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {214--231},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1865/1865.pdf},
doi = {10.1007/11818175_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1866,
title = {Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One},
author = {Rafael Pass and Abhi Shelat and Vinod Vaikuntanathan},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {271--289},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1866/1866.pdf},
doi = {10.1007/11818175_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1867,
title = {Lattice-Based Cryptography},
author = {Oded Regev},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {131--141},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1867/1867.pdf},
doi = {10.1007/11818175_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1868,
title = {Cryptographic Protocols for Electronic Voting},
author = {David Wagner},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {393},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1868/1868.pdf},
doi = {10.1007/11818175_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1869,
title = {A Method for Making Password-Based Key Exchange Resilient to Server Compromise},
author = {Craig Gentry and Philip D. MacKenzie and Zulfikar Ramzan},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {142--159},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1869/1869.pdf},
doi = {10.1007/11818175_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1885,
title = {Asymptotically Optimal Two-Round Perfectly Secure Message Transmission},
author = {Saurabh Agarwal and Ronald Cramer and Robbert de Haan},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {394--408},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1885/1885.pdf},
doi = {10.1007/11818175_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1886,
title = {Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs},
author = {Elad Barkan and Eli Biham and Adi Shamir},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {1--21},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1886/1886.pdf},
doi = {10.1007/11818175_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1887,
title = {New Proofs for NMAC and HMAC: Security Without Collision-Resistance},
author = {Mihir Bellare},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {602--619},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1887/1887.pdf},
doi = {10.1007/11818175_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1888,
title = {Automated Security Proofs with Sequences of Games},
author = {Bruno Blanchet and David Pointcheval},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {537--554},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1888/1888.pdf},
doi = {10.1007/11818175_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1889,
title = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)},
author = {Xavier Boyen and Brent Waters},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {290--307},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1889/1889.pdf},
doi = {10.1007/11818175_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1890,
title = {Mitigating Dictionary Attacks on Password-Protected Local Storage},
author = {Ran Canetti and Shai Halevi and Michael Steiner},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {160--179},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1890/1890.pdf},
doi = {10.1007/11818175_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1891,
title = {On the Higher Order Nonlinearities of Algebraic Immune Functions},
author = {Claude Carlet},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {584--601},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1891/1891.pdf},
doi = {10.1007/11818175_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1892,
title = {On Signatures of Knowledge},
author = {Melissa Chase and Anna Lysyanskaya},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {78--96},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1892/1892.pdf},
doi = {10.1007/11818175_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1893,
title = {When Random Sampling Preserves Privacy},
author = {Kamalika Chaudhuri and Nina Mishra},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {198--213},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1893/1893.pdf},
doi = {10.1007/11818175_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1894,
title = {Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields},
author = {Hao Chen and Ronald Cramer},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {521--536},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1894/1894.pdf},
doi = {10.1007/11818175_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1895,
title = {Oblivious Transfer and Linear Functions},
author = {Ivan Damg\r ard and Serge Fehr and Louis Salvail and Christian Schaffner},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {427--444},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1895/1895.pdf},
doi = {10.1007/11818175_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1896,
title = {Scalable Secure Multiparty Computation},
author = {Ivan Damg\r ard and Yuval Ishai},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {501--520},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1896/1896.pdf},
doi = {10.1007/11818175_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1897,
title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets},
author = {Yevgeniy Dodis and Jonathan Katz and Leonid Reyzin and Adam Smith},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {232--250},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1897/1897.pdf},
doi = {10.1007/11818175_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1898,
title = {On Forward-Secure Storage},
author = {Stefan Dziembowski},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {251--270},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1898/1898.pdf},
doi = {10.1007/11818175_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1899,
title = {Cryptanalysis of 2R^{-} Schemes},
author = {Jean-Charles Faug\`ere and Ludovic Perret},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {357--372},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1899/1899.pdf},
doi = {10.1007/11818175_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1900,
title = {Round-Optimal Composable Blind Signatures in the Common Reference String Model},
author = {Marc Fischlin},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {60--77},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1900/1900.pdf},
doi = {10.1007/11818175_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1901,
title = {Rankin's Constant and Blockwise Lattice Reduction},
author = {Nicolas Gama and Nick Howgrave-Graham and Henrik Koy and Phong Q. Nguyen},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {112--130},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1901/1901.pdf},
doi = {10.1007/11818175_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1904,
title = {Inverting HFE Is Quasipolynomial},
author = {Louis Granboulan and Antoine Joux and Jacques Stern},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {345--356},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1904/1904.pdf},
doi = {10.1007/11818175_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1905,
title = {Non-interactive Zaps and New Techniques for NIZK},
author = {Jens Groth and Rafail Ostrovsky and Amit Sahai},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {97--111},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1905/1905.pdf},
doi = {10.1007/11818175_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1906,
title = {On the Power of the Randomized Iterate},
author = {Iftach Haitner and Danny Harnik and Omer Reingold},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {22--40},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1906/1906.pdf},
doi = {10.1007/11818175_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1651,
title = {Random Selection with an Adversarial Majority},
author = {Ronen Gradwohl and Salil P. Vadhan and David Zuckerman},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {409--426},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1651/1651.pdf},
doi = {10.1007/11818175_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1907,
title = {Strengthening Digital Signatures Via Randomized Hashing},
author = {Shai Halevi and Hugo Krawczyk},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {41--59},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1907/1907.pdf},
doi = {10.1007/11818175_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1652,
title = {On the Impossibility of Efficiently Combining Collision Resistant Hash Functions},
author = {Dan Boneh and Xavier Boyen},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {570--583},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1652/1652.pdf},
doi = {10.1007/11818175_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1908,
title = {Robust Multiparty Computation with Linear Communication Complexity},
author = {Martin Hirt and Jesper Buus Nielsen},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {463--482},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1908/1908.pdf},
doi = {10.1007/11818175_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1909,
title = {On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation},
author = {Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {483--500},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1909/1909.pdf},
doi = {10.1007/11818175_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1910,
title = {The Number Field Sieve in the Medium Prime Case},
author = {Antoine Joux and Reynald Lercier and Nigel P. Smart and Frederik Vercauteren},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {326--344},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1910/1910.pdf},
doi = {10.1007/11818175_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1911,
title = {On Expected Constant-Round Protocols for Byzantine Agreement},
author = {Jonathan Katz and Chiu-Yuen Koo},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {445--462},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1911/1911.pdf},
doi = {10.1007/11818175_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1912,
title = {Rationality and Adversarial Behavior in Multi-party Computation},
author = {Anna Lysyanskaya and Nikos Triandopoulos},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {180--197},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1912/1912.pdf},
doi = {10.1007/11818175_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1913,
title = {On Robust Combiners for Private Information Retrieval and Other Primitives},
author = {Remo Meier and Bartosz Przydatek},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {555--569},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1913/1913.pdf},
doi = {10.1007/11818175_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1914,
title = {Receipt-Free Universally-Verifiable Voting with Everlasting Privacy},
author = {Tal Moran and Moni Naor},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {373--392},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1914/1914.pdf},
doi = {10.1007/11818175_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{crypto-2006-1915,
title = {Fast Algorithms for the Free Riders Problem in Broadcast Encryption},
author = {Zulfikar Ramzan and David P. Woodruff},
booktitle = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference},
volume = {4117},
pages = {308--325},
url = {http://www.iacr.org/cryptodb/archive/2006/CRYPTO/1915/1915.pdf},
doi = {10.1007/11818175_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@proceedings{crypto-2006-23717,
title = {Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings},
author = {Cynthia Dwork},
booktitle = {CRYPTO},
volume = {4117},
url = {http://link.springer.com/book/10.1007/11818175},
doi = {10.1007/11818175},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2560,
title = {Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol},
author = {Tal Moran and Moni Naor},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {88--108},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2560/2560.pdf},
doi = {10.1007/11761679_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2319,
title = {Our Data, Ourselves: Privacy Via Distributed Noise Generation},
author = {Cynthia Dwork and Krishnaram Kenthapadi and Frank McSherry and Ilya Mironov and Moni Naor},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {486--503},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2319/2319.pdf},
doi = {10.1007/11761679_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2583,
title = {Sequential Aggregate Signatures and Multisignatures Without Random Oracles},
author = {Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {465--485},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2583/2583.pdf},
doi = {10.1007/11761679_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2330,
title = {Practical Identity-Based Encryption Without Random Oracles},
author = {Craig Gentry},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {445--464},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2330/2330.pdf},
doi = {10.1007/11761679_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2347,
title = {Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects},
author = {Jean-Charles Faug\`ere and Ludovic Perret},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {30--47},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2347/2347.pdf},
doi = {10.1007/11761679_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2606,
title = {Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures},
author = {Phong Q. Nguyen and Oded Regev},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {271--288},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2606/2606.pdf},
doi = {10.1007/11761679_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2100,
title = {Compact Group Signatures Without Random Oracles},
author = {Xavier Boyen and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {427--444},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2100/2100.pdf},
doi = {10.1007/11761679_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2103,
title = {Hiding Secret Points Amidst Chaff},
author = {Ee-Chien Chang and Qiming Li},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {59--72},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2103/2103.pdf},
doi = {10.1007/11761679_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2876,
title = {Oblivious Transfer Is Symmetric},
author = {Stefan Wolf and J\"urg Wullschleger},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {222--232},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2876/2876.pdf},
doi = {10.1007/11761679_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2629,
title = {Luby-Rackoff Ciphers from Weak Round Functions?},
author = {Ueli M. Maurer and Yvonne Anne Oswald and Krzysztof Pietrzak and Johan Sj\"odin},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {391--408},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2629/2629.pdf},
doi = {10.1007/11761679_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2641,
title = {Language Modeling and Encryption on Packet Switched Networks},
author = {Kevin S. McCurley},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {359--372},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2641/2641.pdf},
doi = {10.1007/11761679_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2143,
title = {Security Analysis of the Strong Diffie-Hellman Problem},
author = {Jung Hee Cheon},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {1--11},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2143/2143.pdf},
doi = {10.1007/11761679_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2402,
title = {How to Strengthen Pseudo-random Generators by Using Compression},
author = {Aline Gouget and Herv\'e Sibert},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {129--146},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2402/2402.pdf},
doi = {10.1007/11761679_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2406,
title = {Alien *vs.* Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt},
author = {Vanessa Gratzer and David Naccache},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {48--58},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2406/2406.ps},
doi = {10.1007/11761679_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2412,
title = {Perfect Non-interactive Zero Knowledge for NP},
author = {Jens Groth and Rafail Ostrovsky and Amit Sahai},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {339--358},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2412/2412.pdf},
doi = {10.1007/11761679_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2163,
title = {VSH, an Efficient and Provable Collision-Resistant Hash Function},
author = {Scott Contini and Arjen K. Lenstra and Ron Steinfeld},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {165--182},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2163/2163.pdf},
doi = {10.1007/11761679_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2690,
title = {Cryptography in Theory and Practice: The Case of Encryption in IPsec},
author = {Kenneth G. Paterson and Arnold K. L. Yau},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {12--29},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2690/2690.pdf},
doi = {10.1007/11761679_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2435,
title = {The Function Field Sieve in the Medium Prime Case},
author = {Antoine Joux and Reynald Lercier},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {254--270},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2435/2435.pdf},
doi = {10.1007/11761679_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2457,
title = {Parallel and Concurrent Security of the HB and HB^{+} Protocols},
author = {Jonathan Katz and Ji Sun Shin},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {73--87},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2457/2457.pdf},
doi = {10.1007/11761679_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2713,
title = {Composition Implies Adaptive Security in Minicrypt},
author = {Krzysztof Pietrzak},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {328--338},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2713/2713.pdf},
doi = {10.1007/11761679_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2467,
title = {Herding Hash Functions and the Nostradamus Attack},
author = {John Kelsey and Tadayoshi Kohno},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {183--200},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2467/2467.pdf},
doi = {10.1007/11761679_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2726,
title = {Efficient Binary Conversion for Paillier Encrypted Values},
author = {Berry Schoenmakers and Pim Tuyls},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {522--537},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2726/2726.pdf},
doi = {10.1007/11761679_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2217,
title = {Optimal Reductions Between Oblivious Transfers Using Interactive Hashing},
author = {Claude Cr\'epeau and George Savvides},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {201--221},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2217/2217.pdf},
doi = {10.1007/11761679_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@proceedings{eurocrypt-2006-23721,
title = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
author = {Serge Vaudenay},
booktitle = {EUROCRYPT},
volume = {4004},
url = {http://link.springer.com/book/10.1007/11761679},
doi = {10.1007/11761679},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-1964,
title = {Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys},
author = {Dan Boneh and Amit Sahai and Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {573--592},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/1964/1964.pdf},
doi = {10.1007/11761679_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2476,
title = {On the (Im-)Possibility of Extending Coin Toss},
author = {Dennis Hofheinz and J\"orn M\"uller-Quade and Dominique Unruh},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {504--521},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2476/2476.pdf},
doi = {10.1007/11761679_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2223,
title = {Information-Theoretic Conditions for Two-Party Secure Function Evaluation},
author = {Claude Cr\'epeau and George Savvides and Christian Schaffner and J\"urg Wullschleger},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {538--554},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2223/2223.pdf},
doi = {10.1007/11761679_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2761,
title = {A Provable-Security Treatment of the Key-Wrap Problem},
author = {Phillip Rogaway and Thomas Shrimpton},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {373--390},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2761/2761.pdf},
doi = {10.1007/11761679_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-1994,
title = {QUAD: A Practical Stream Cipher with Provable Security},
author = {C\^ome Berbain and Henri Gilbert and Jacques Patarin},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {109--128},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/1994/1994.pdf},
doi = {10.1007/11761679_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2250,
title = {Unclonable Group Identification},
author = {Ivan Damg\r ard and Kasper Dupont and Michael \Ostergaard Pedersen},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {555--572},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2250/2250.pdf},
doi = {10.1007/11761679_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2508,
title = {Private Circuits II: Keeping Secrets in Tamperable Circuits},
author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai and David Wagner},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {308--327},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2508/2508.pdf},
doi = {10.1007/11761679_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2013,
title = {Simplified Threshold RSA with Adaptive and Proactive Security},
author = {Jes\'us F. Almansa and Ivan Damg\r ard and Jesper Buus Nielsen},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {593--611},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2013/2013.pdf},
doi = {10.1007/11761679_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2272,
title = {The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model},
author = {Alexander W. Dent},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {289--307},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2272/2272.pdf},
doi = {10.1007/11761679_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2024,
title = {The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs},
author = {Mihir Bellare and Phillip Rogaway},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {409--426},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2024/2024.pdf},
doi = {10.1007/11761679_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2026,
title = {Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks},
author = {Frederik Armknecht and Claude Carlet and Philippe Gaborit and Simon K\"unzli 0002 and Willi Meier and Olivier Ruatta},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {147--164},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2026/2026.pdf},
doi = {10.1007/11761679_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{eurocrypt-2006-2294,
title = {Symplectic Lattice Reduction and NTRU},
author = {Nicolas Gama and Nick Howgrave-Graham and Phong Q. Nguyen},
booktitle = {Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
volume = {4004},
pages = {233--253},
url = {http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2294/2294.pdf},
doi = {10.1007/11761679_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3222,
title = {Cryptanalysis of the Stream Cipher DECIM},
author = {Hongjun Wu and Bart Preneel},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {30--40},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3222/3222.pdf},
doi = {10.1007/11799313_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3226,
title = {Chosen-Ciphertext Attacks Against MOSQUITO},
author = {Antoine Joux and Fr\'ed\'eric Muller},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {390--404},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3226/3226.pdf},
doi = {10.1007/11799313_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3231,
title = {Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators},
author = {Matthias Krause and Dirk Stegemann},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {163--178},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3231/3231.pdf},
doi = {10.1007/11799313_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3233,
title = {Some Plausible Constructions of Double-Block-Length Hash Functions},
author = {Shoichi Hirose},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {210--225},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3233/3233.pdf},
doi = {10.1007/11799313_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3234,
title = {Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions},
author = {Jonathan J. Hoch and Adi Shamir},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {179--194},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3234/3234.pdf},
doi = {10.1007/11799313_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3235,
title = {Cryptanalysis of Grain},
author = {C\^ome Berbain and Henri Gilbert and Alexander Maximov},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {15--29},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3235/3235.pdf},
doi = {10.1007/11799313_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3236,
title = {The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function},
author = {John Black},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {328--340},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3236/3236.pdf},
doi = {10.1007/11799313_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3237,
title = {A Study of the MD5 Attacks: Insights and Improvements},
author = {John Black and Martin Cochran and Trevor Highland},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {262--277},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3237/3237.pdf},
doi = {10.1007/11799313_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3238,
title = {A Zero-Dimensional Gr\"obner Basis for AES-128},
author = {Johannes Buchmann and Andrei Pyshkin and Ralf-Philipp Weinmann},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {78--88},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3238/3238.pdf},
doi = {10.1007/11799313_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3239,
title = {A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation},
author = {Debrup Chakraborty and Palash Sarkar},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {293--309},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3239/3239.pdf},
doi = {10.1007/11799313_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3240,
title = {Computing the Algebraic Immunity Efficiently},
author = {Fr\'ed\'eric Didier and Jean-Pierre Tillich},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {359--374},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3240/3240.pdf},
doi = {10.1007/11799313_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3241,
title = {Pseudorandom Permutation Families over Abelian Groups},
author = {Louis Granboulan and \'Eric Levieil and Gilles Piret},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {57--77},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3241/3241.pdf},
doi = {10.1007/11799313_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3242,
title = {A New Dedicated 256-Bit Hash Function: FORK-256},
author = {Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jaesang Lee and Dukjae Moon and Sungtaek Chee},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {195--209},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3242/3242.pdf},
doi = {10.1007/11799313_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3243,
title = {New Blockcipher Modes of Operation with Beyond the Birthday Bound Security},
author = {Tetsu Iwata},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {310--327},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3243/3243.pdf},
doi = {10.1007/11799313_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3244,
title = {Cryptanalysis of Achterbahn},
author = {Thomas Johansson and Willi Meier and Fr\'ed\'eric Muller},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {1--14},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3244/3244.pdf},
doi = {10.1007/11799313_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3245,
title = {Collisions and Near-Collisions for Reduced-Round Tiger},
author = {John Kelsey and Stefan Lucks},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {111--125},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3245/3245.pdf},
doi = {10.1007/11799313_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3246,
title = {How Far Can We Go on the x64 Processors?},
author = {Mitsuru Matsui},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {341--358},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3246/3246.pdf},
doi = {10.1007/11799313_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3247,
title = {Analysis of Step-Reduced SHA-256},
author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {126--143},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3247/3247.pdf},
doi = {10.1007/11799313_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3248,
title = {The Impact of Carries on the Complexity of Collision Attacks on SHA-1},
author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {278--292},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3248/3248.pdf},
doi = {10.1007/11799313_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3249,
title = {Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations},
author = {Kazuhiko Minematsu and Yukiyasu Tsunoo},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {226--241},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3249/3249.pdf},
doi = {10.1007/11799313_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@proceedings{fse-2006-23729,
title = {Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers},
author = {Matthew J. B. Robshaw},
booktitle = {FSE},
volume = {4047},
url = {http://link.springer.com/book/10.1007/11799313},
doi = {10.1007/11799313},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3250,
title = {Upper Bounds on Algebraic Immunity of Boolean Power Functions},
author = {Yassir Nawaz and Guang Gong and Kishan Chand Gupta},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {375--389},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3250/3250.pdf},
doi = {10.1007/11799313_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3251,
title = {Improved Linear Distinguishers for SNOW 2.0},
author = {Kaisa Nyberg and Johan Wall\'en},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {144--162},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3251/3251.pdf},
doi = {10.1007/11799313_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3252,
title = {Distinguishing Attacks on the Stream Cipher Py},
author = {Souradyuti Paul and Bart Preneel and Gautham Sekar},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {405--421},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3252/3252.pdf},
doi = {10.1007/11799313_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3253,
title = {Searching for Differential Paths in MD4},
author = {Martin Schl\"affer and Elisabeth Oswald},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {242--261},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3253/3253.pdf},
doi = {10.1007/11799313_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3254,
title = {On Feistel Structures Using a Diffusion Switching Mechanism},
author = {Taizo Shirai and Kyoji Shibutani},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {41--56},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3254/3254.pdf},
doi = {10.1007/11799313_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3255,
title = {Resynchronization Attacks on WG and LEX},
author = {Hongjun Wu and Bart Preneel},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {422--432},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3255/3255.pdf},
doi = {10.1007/11799313_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{fse-2006-3256,
title = {Cryptanalysis of the Full HAVAL with 4 and 5 Passes},
author = {Hongbo Yu and Xiaoyun Wang and Aaram Yun and Sangwoo Park},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006},
volume = {4047},
pages = {89--110},
url = {http://www.iacr.org/cryptodb/archive/2006/FSE/3256/3256.pdf},
doi = {10.1007/11799313_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@article{jofc-2006-14337,
title = {An Elliptic Curve Trapdoor System},
author = {Edlyn Teske},
journal = {J. Cryptology},
volume = {19},
pages = {115--133},
doi = {10.1007/s00145-004-0328-3},
year = {2006}
}
@article{jofc-2006-14343,
title = {Session-Key Generation Using Human Passwords Only},
author = {Oded Goldreich and Yehuda Lindell},
journal = {J. Cryptology},
volume = {19},
pages = {241--340},
doi = {10.1007/s00145-006-0233-z},
year = {2006}
}
@article{jofc-2006-14344,
title = {On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order},
author = {Marc Girault and Guillaume Poupard and Jacques Stern},
journal = {J. Cryptology},
volume = {19},
pages = {463--487},
doi = {10.1007/s00145-006-0224-0},
year = {2006}
}
@article{jofc-2006-14111,
title = {Strengthening Zero-Knowledge Protocols Using Signatures},
author = {Juan A. Garay and Philip D. MacKenzie and Ke Yang},
journal = {J. Cryptology},
volume = {19},
pages = {169--209},
doi = {10.1007/s00145-005-0307-3},
year = {2006}
}
@article{jofc-2006-14169,
title = {On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions},
author = {Ran Canetti and Eyal Kushilevitz and Yehuda Lindell},
journal = {J. Cryptology},
volume = {19},
pages = {135--167},
doi = {10.1007/s00145-005-0419-9},
year = {2006}
}
@article{jofc-2006-14191,
title = {An Improved Real-Quadratic-Field-Based Key Exchange Procedure},
author = {Michael J. Jacobson Jr. and Renate Scheidler and Hugh C. Williams},
journal = {J. Cryptology},
volume = {19},
pages = {211--239},
doi = {10.1007/s00145-005-0357-6},
year = {2006}
}
@article{jofc-2006-14205,
title = {Characterization of Security Notions for Probabilistic Private-Key Encryption},
author = {Jonathan Katz and Moti Yung},
journal = {J. Cryptology},
volume = {19},
pages = {67--95},
doi = {10.1007/s00145-005-0310-8},
year = {2006}
}
@article{jofc-2006-14230,
title = {Threshold Password-Authenticated Key Exchange},
author = {Philip D. MacKenzie and Thomas Shrimpton and Markus Jakobsson},
journal = {J. Cryptology},
volume = {19},
pages = {27--66},
doi = {10.1007/s00145-005-0232-5},
year = {2006}
}
@article{jofc-2006-14289,
title = {Elliptic Curves with Low Embedding Degree},
author = {Florian Luca and Igor Shparlinski},
journal = {J. Cryptology},
volume = {19},
pages = {553--562},
doi = {10.1007/s00145-006-0544-0},
year = {2006}
}
@article{jofc-2006-14291,
title = {Private Computation: k-Connected versus 1-Connected Networks},
author = {Markus Bl\"aser and Andreas Jakoby and Maciej Liskiewicz and Bodo Manthey},
journal = {J. Cryptology},
volume = {19},
pages = {341--357},
doi = {10.1007/s00145-005-0329-x},
year = {2006}
}
@article{jofc-2006-14293,
title = {An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate},
author = {Ivan Damg\r ard and Gudmund Skovbjerg Frandsen},
journal = {J. Cryptology},
volume = {19},
pages = {489--520},
doi = {10.1007/s00145-006-0332-x},
year = {2006}
}
@article{jofc-2006-14295,
title = {Completeness in Two-Party Secure Computation: A Computational View},
author = {Danny Harnik and Moni Naor and Omer Reingold and Alon Rosen},
journal = {J. Cryptology},
volume = {19},
pages = {521--552},
doi = {10.1007/s00145-006-0346-4},
year = {2006}
}
@article{jofc-2006-14297,
title = {A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions},
author = {Yehuda Lindell},
journal = {J. Cryptology},
volume = {19},
pages = {359--377},
doi = {10.1007/s00145-005-0345-x},
year = {2006}
}
@article{jofc-2006-14299,
title = {A Proof of the Security of Quantum Key Distribution},
author = {Eli Biham and Michel Boyer and P. Oscar Boykin and Tal Mor and Vwani P. Roychowdhury},
journal = {J. Cryptology},
volume = {19},
pages = {381--439},
doi = {10.1007/s00145-005-0011-3},
year = {2006}
}
@article{jofc-2006-14301,
title = {Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers},
author = {Deukjo Hong and Seokhie Hong and Wonil Lee and Sangjin Lee and Jongin Lim and Jaechul Sung and Okyeon Yi},
journal = {J. Cryptology},
volume = {19},
pages = {441--462},
doi = {10.1007/s00145-006-0205-3},
year = {2006}
}
@article{jofc-2006-14059,
title = {An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2},
author = {Jan Denef and Frederik Vercauteren},
journal = {J. Cryptology},
volume = {19},
pages = {1--25},
doi = {10.1007/s00145-004-0231-y},
year = {2006}
}
@article{jofc-2006-14065,
title = {The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives},
author = {Yan-Cheng Chang and Chun-Yuan Hsiao and Chi-Jen Lu},
journal = {J. Cryptology},
volume = {19},
pages = {97--114},
doi = {10.1007/s00145-005-0317-1},
year = {2006}
}
@inproceedings{pkc-2006-3351,
title = {Curve25519: New Diffie-Hellman Speed Records},
author = {Daniel J. Bernstein},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {207--228},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3351/3351.pdf},
doi = {10.1007/11745853_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3352,
title = {Identity-Based Aggregate Signatures},
author = {Craig Gentry and Zulfikar Ramzan},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {257--273},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3352/3352.ps},
doi = {10.1007/11745853_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3353,
title = {Building Better Signcryption Schemes with Tag-KEMs},
author = {Tor E. Bj\orstad and Alexander W. Dent},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {491--507},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3353/3353.pdf},
doi = {10.1007/11745853_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3357,
title = {An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve},
author = {An Commeine and Igor Semaev},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {174--190},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3357/3357.pdf},
doi = {10.1007/11745853_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3362,
title = {New Attacks on RSA with Small Secret CRT-Exponents},
author = {Daniel Bleichenbacher and Alexander May},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {1--13},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3362/3362.pdf},
doi = {10.1007/11745853_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3370,
title = {Strongly Unforgeable Signatures Based on Computational Diffie-Hellman},
author = {Dan Boneh and Emily Shen and Brent Waters},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {229--240},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3370/3370.pdf},
doi = {10.1007/11745853_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3375,
title = {Parallel Key-Insulated Public Key Encryption},
author = {Goichiro Hanaoka and Yumiko Hanaoka and Hideki Imai},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {105--122},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3375/3375.pdf},
doi = {10.1007/11745853_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3397,
title = {Generalization of the Selective-ID Security Model for HIBE Protocols},
author = {Sanjit Chatterjee and Palash Sarkar},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {241--256},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3397/3397.pdf},
doi = {10.1007/11745853_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3403,
title = {Encoding-Free ElGamal Encryption Without Random Oracles},
author = {Beno\^\it Chevallier-Mames and Pascal Paillier and David Pointcheval},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {91--104},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3403/3403.pdf},
doi = {10.1007/11745853_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3406,
title = {The Twist-AUgmented Technique for Key Exchange},
author = {Olivier Chevassut and Pierre-Alain Fouque and Pierrick Gaudry and David Pointcheval},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {410--426},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3406/3406.pdf},
doi = {10.1007/11745853_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3410,
title = {Security-Mediated Certificateless Cryptography},
author = {Sherman S. M. Chow and Colin Boyd and Juan Manuel Gonz\'alez Nieto},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {508--524},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3410/3410.pdf},
doi = {10.1007/11745853_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3414,
title = {Conditional Oblivious Cast},
author = {Cheng-Kang Chu and Wen-Guey Tzeng},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {443--457},
doi = {10.1007/11745853_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3428,
title = {Linear Integer Secret Sharing and Distributed Exponentiation},
author = {Ivan Damg\r ard and Rune Thorbek},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {75--90},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3428/3428.pdf},
doi = {10.1007/11745853_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3429,
title = {Generic On-Line/Off-Line Threshold Signatures},
author = {Chris Crutchfield and David Molnar and David Turner and David Wagner},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {58--74},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3429/3429.pdf},
doi = {10.1007/11745853_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3439,
title = {Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm},
author = {S\'ebastien Kunz-Jacques and Gwena\"elle Martinet and Guillaume Poupard and Jacques Stern},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {27--43},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3439/3439.pdf},
doi = {10.1007/11745853_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3442,
title = {The Power of Identification Schemes},
author = {Kaoru Kurosawa and Swee-Huay Heng},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {364--377},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3442/3442.pdf},
doi = {10.1007/11745853_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3444,
title = {New Online/Offline Signature Schemes Without Random Oracles},
author = {Kaoru Kurosawa and Katja Schmidt-Samoa},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {330--346},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3444/3444.pdf},
doi = {10.1007/11745853_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3446,
title = {Security Analysis of KEA Authenticated Key Exchange Protocol},
author = {Kristin Lauter and Anton Mityagin},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {378--394},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3446/3446.pdf},
doi = {10.1007/11745853_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3455,
title = {On Constructing Certificateless Cryptosystems from Identity Based Encryption},
author = {Beno\^\it Libert and Jean-Jacques Quisquater},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {474--490},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3455/3455.pdf},
doi = {10.1007/11745853_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3458,
title = {Provably Secure Steganography with Imperfect Sampling},
author = {Anna Lysyanskaya and Mira Meyerovich},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {123--139},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3458/3458.pdf},
doi = {10.1007/11745853_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3464,
title = {Collision-Resistant No More: Hash-and-Sign Paradigm Revisited},
author = {Ilya Mironov},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {140--156},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3464/3464.pdf},
doi = {10.1007/11745853_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3468,
title = {Efficient Polynomial Operations in the Shared-Coefficients Setting},
author = {Payman Mohassel and Matthew K. Franklin},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {44--57},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3468/3468.pdf},
doi = {10.1007/11745853_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3469,
title = {Efficiency Tradeoffs for Malicious Two-Party Computation},
author = {Payman Mohassel and Matthew K. Franklin},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {458--473},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3469/3469.pdf},
doi = {10.1007/11745853_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3473,
title = {High-Order Attacks Against the Exponent Splitting Protection},
author = {Fr\'ed\'eric Muller and Fr\'ed\'eric Valette},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {315--329},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3473/3473.pdf},
doi = {10.1007/11745853_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3474,
title = {Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol},
author = {Alexei G. Myasnikov and Vladimir Shpilrain and Alexander Ushakov},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {302--314},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3474/3474.ps},
doi = {10.1007/11745853_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3493,
title = {SAS-Based Authenticated Key Agreement},
author = {Sylvain Pasini and Serge Vaudenay},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {395--409},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3493/3493.ps},
doi = {10.1007/11745853_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@proceedings{pkc-2006-23738,
title = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings},
author = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin},
booktitle = {PKC},
volume = {3958},
url = {http://link.springer.com/book/10.1007/11745853},
doi = {10.1007/11745853},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3515,
title = {Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption},
author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {157--173},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3515/3515.pdf},
doi = {10.1007/11745853_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3520,
title = {*k*-Times Anonymous Authentication with a Constant Proving Cost},
author = {Isamu Teranishi and Kazue Sako},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {525--542},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3520/3520.pdf},
doi = {10.1007/11745853_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3535,
title = {An Attack on a Modified Niederreiter Encryption Scheme},
author = {Christian Wieschebrink},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {14--26},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3535/3535.pdf},
doi = {10.1007/11745853_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3541,
title = {Anonymous Signature Schemes},
author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {347--363},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3541/3541.pdf},
doi = {10.1007/11745853_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3286,
title = {On the Limitations of the Spread of an IBE-to-PKE Transformation},
author = {Eike Kiltz},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {274--289},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3286/3286.pdf},
doi = {10.1007/11745853_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3303,
title = {Password-Based Group Key Exchange in a Constant Number of Rounds},
author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and David Pointcheval},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {427--442},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3303/3303.pdf},
doi = {10.1007/11745853_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3308,
title = {Inoculating Multivariate Schemes Against Differential Attacks},
author = {Jintai Ding and Jason E. Gower},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {290--301},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3308/3308.pdf},
doi = {10.1007/11745853_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{pkc-2006-3312,
title = {Efficient Scalar Multiplication by Isogeny Decompositions},
author = {Christophe Doche and Thomas Icart and David R. Kohel},
booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography},
volume = {3958},
pages = {191--206},
url = {http://www.iacr.org/cryptodb/archive/2006/PKC/3312/3312.pdf},
doi = {10.1007/11745853_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3590,
title = {Efficient Multi-party Computation with Dispute Control},
author = {Zuzana Beerliov\'a-Trub\'\iniov\'a and Martin Hirt},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {305--328},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3590/3590.pdf},
doi = {10.1007/11681878_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3592,
title = {On Matroids and Non-ideal Secret Sharing},
author = {Amos Beimel and Noam Livne},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {482--501},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3592/3592.pdf},
doi = {10.1007/11681878_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3595,
title = {Communication Efficient Secure Linear Algebra},
author = {Kobbi Nissim and Enav Weinreb},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {522--541},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3595/3595.pdf},
doi = {10.1007/11681878_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3597,
title = {Efficient Blind and Partially Blind Signatures Without Random Oracles},
author = {Tatsuaki Okamoto},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {80--99},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3597/3597.pdf},
doi = {10.1007/11681878_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3599,
title = {On Error Correction in the Exponent},
author = {Chris Peikert},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {167--183},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3599/3599.pdf},
doi = {10.1007/11681878_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3600,
title = {Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles},
author = {Adam Bender and Jonathan Katz and Ruggero Morselli},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {60--79},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3600/3600.pdf},
doi = {10.1007/11681878_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3601,
title = {Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices},
author = {Chris Peikert and Alon Rosen},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {145--166},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3601/3601.pdf},
doi = {10.1007/11681878_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3606,
title = {Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols},
author = {Ran Canetti and Jonathan Herzog},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {380--403},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3606/3606.pdf},
doi = {10.1007/11681878_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3612,
title = {Mercurial Commitments: Minimal Assumptions and Efficient Constructions},
author = {Dario Catalano and Yevgeniy Dodis and Ivan Visconti},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {120--144},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3612/3612.pdf},
doi = {10.1007/11681878_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3617,
title = {Finding Pessiland},
author = {Hoeteck Wee},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {429--442},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3617/3617.pdf},
doi = {10.1007/11681878_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3621,
title = {Interactive Zero-Knowledge with Restricted Random Oracles},
author = {Moti Yung and Yunlei Zhao},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {21--40},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3621/3621.pdf},
doi = {10.1007/11681878_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3622,
title = {Perfectly Secure Password Protocols in the Bounded Retrieval Model},
author = {Giovanni Di Crescenzo and Richard J. Lipton and Shabsi Walfish},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {225--244},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3622/3622.pdf},
doi = {10.1007/11681878_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3624,
title = {Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation},
author = {Ivan Damg\r ard and Matthias Fitzi and Eike Kiltz and Jesper Buus Nielsen and Tomas Toft},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {285--304},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3624/3624.pdf},
doi = {10.1007/11681878_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3628,
title = {Non-interactive Zero-Knowledge from Homomorphic Encryption},
author = {Ivan Damg\r ard and Nelly Fazio and Antonio Nicolosi},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {41--59},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3628/3628.pdf},
doi = {10.1007/11681878_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3630,
title = {Games and the Impossibility of Realizable Ideal Functionality},
author = {Anupam Datta and Ante Derek and John C. Mitchell and Ajith Ramanathan and Andre Scedrov},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {360--379},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3630/3630.pdf},
doi = {10.1007/11681878_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3642,
title = {On the Relation Between the Ideal Cipher and the Random Oracle Models},
author = {Yevgeniy Dodis and Prashant Puniya},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {184--206},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3642/3642.pdf},
doi = {10.1007/11681878_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3644,
title = {Separating Sources for Encryption and Secret Sharing},
author = {Yevgeniy Dodis and Krzysztof Pietrzak and Bartosz Przydatek},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {601--616},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3644/3644.pdf},
doi = {10.1007/11681878_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3648,
title = {Threshold and Proactive Pseudo-Random Permutations},
author = {Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {542--560},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3648/3648.pdf},
doi = {10.1007/11681878_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3650,
title = {Calibrating Noise to Sensitivity in Private Data Analysis},
author = {Cynthia Dwork and Frank McSherry and Kobbi Nissim and Adam Smith},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {265--284},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3650/3650.pdf},
doi = {10.1007/11681878_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3654,
title = {Intrusion-Resilience Via the Bounded-Storage Model},
author = {Stefan Dziembowski},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {207--224},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3654/3654.pdf},
doi = {10.1007/11681878_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3656,
title = {Round-Optimal and Efficient Verifiable Secret Sharing},
author = {Matthias Fitzi and Juan A. Garay and Shyamnath Gollakota and C. Pandu Rangan and K. Srinathan},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {329--342},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3656/3656.pdf},
doi = {10.1007/11681878_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3661,
title = {Resource Fairness and Composability of Cryptographic Protocols},
author = {Juan A. Garay and Philip D. MacKenzie and Manoj Prabhakaran and Ke Yang},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {404--428},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3661/3661.pdf},
doi = {10.1007/11681878_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3680,
title = {Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness},
author = {Thomas Holenstein},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {443--461},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3680/3680.pdf},
doi = {10.1007/11681878_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3682,
title = {Polylogarithmic Private Approximations and Efficient Matching},
author = {Piotr Indyk and David P. Woodruff},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {245--264},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3682/3682.pdf},
doi = {10.1007/11681878_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3689,
title = {PRF Domain Extension Using DAGs},
author = {Charanjit S. Jutla},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {561--580},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3689/3689.pdf},
doi = {10.1007/11681878_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3691,
title = {Chosen-Ciphertext Security from Tag-Based Encryption},
author = {Eike Kiltz},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {581--600},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3691/3691.ps},
doi = {10.1007/11681878_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3693,
title = {Key Exchange Using Passwords and Long Keys},
author = {Vladimir Kolesnikov and Charles Rackoff},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {100--119},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3693/3693.pdf},
doi = {10.1007/11681878_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3694,
title = {Secure Computation with Partial Message Loss},
author = {Chiu-Yuen Koo},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {502--521},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3694/3694.pdf},
doi = {10.1007/11681878_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3695,
title = {On the Complexity of Parallel Hardness Amplification for One-Way Functions},
author = {Chi-Jen Lu},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {462--481},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3695/3695.pdf},
doi = {10.1007/11681878_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3697,
title = {Generalized Environmental Security from Number Theoretic Assumptions},
author = {Tal Malkin and Ryan Moriarty and Nikolai Yakovenko},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {343--359},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3697/3697.pdf},
doi = {10.1007/11681878_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{tcc-2006-3703,
title = {Concurrent Zero Knowledge Without Complexity Assumptions},
author = {Daniele Micciancio and Shien Jin Ong and Amit Sahai and Salil P. Vadhan},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
volume = {3876},
pages = {1--20},
url = {http://www.iacr.org/cryptodb/archive/2006/TCC/3703/3703.pdf},
doi = {10.1007/11681878_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@proceedings{tcc-2006-23744,
title = {Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings},
author = {Shai Halevi and Tal Rabin},
booktitle = {TCC},
volume = {3876},
url = {http://link.springer.com/book/10.1007/11681878},
doi = {10.1007/11681878},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2006}
}
@inproceedings{asiacrypt-2005-261,
title = {Some Attacks Against a Double Length Hash Proposal},
author = {Lars R. Knudsen and Fr\'ed\'eric Muller},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {462--473},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/261/261.pdf},
doi = {10.1007/11593447_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-273,
title = {Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation},
author = {Vladimir Kolesnikov},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {136--155},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/273/273.pdf},
doi = {10.1007/11593447_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-278,
title = {Universally Anonymizable Public-Key Encryption},
author = {Ryotaro Hayashi and Keisuke Tanaka},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {293--312},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/278/278.pdf},
doi = {10.1007/11593447_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@proceedings{asiacrypt-2005-26,
title = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
booktitle = {ASIACRYPT},
volume = {3788},
url = {http://link.springer.com/book/10.1007/11593447},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-283,
title = {Modular Security Proofs for Key Agreement Protocols},
author = {Caroline Kudla and Kenneth G. Paterson},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {549--565},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/283/283.pdf},
doi = {10.1007/11593447_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-29,
title = {A Related-Key Rectangle Attack on the Full KASUMI},
author = {Eli Biham and Orr Dunkelman and Nathan Keller},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {443--461},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/29/29.pdf},
doi = {10.1007/11593447_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-285,
title = {New Improvements of Davies-Murphy Cryptanalysis},
author = {S\'ebastien Kunz-Jacques and Fr\'ed\'eric Muller},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {425--442},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/285/285.pdf},
doi = {10.1007/11593447_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-32,
title = {A Simple Threshold Authenticated Key Exchange from Short Secrets},
author = {Michel Abdalla and Olivier Chevassut and Pierre-Alain Fouque and David Pointcheval},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {566--584},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/32/32.pdf},
doi = {10.1007/11593447_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-288,
title = {Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation},
author = {Martin Hirt and Jesper Buus Nielsen},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {79--99},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/288/288.pdf},
doi = {10.1007/11593447_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-547,
title = {A Sender Verifiable Mix-Net and a New Proof of a Shuffle},
author = {Douglas Wikstr\"om},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {273--292},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/547/547.pdf},
doi = {10.1007/11593447_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-294,
title = {New Applications of Time Memory Data Tradeoffs},
author = {Jin Hong and Palash Sarkar},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {353--372},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/294/294.pdf},
doi = {10.1007/11593447_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-307,
title = {Universally Convertible Directed Signatures},
author = {Fabien Laguillaumie and Pascal Paillier and Damien Vergnaud},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {682--701},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/307/307.pdf},
doi = {10.1007/11593447_37},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-53,
title = {Privacy-Preserving Graph Algorithms in the Semi-honest Model},
author = {Justin Brickell and Vitaly Shmatikov},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {236--252},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/53/53.pdf},
doi = {10.1007/11593447_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-313,
title = {Adapting Density Attacks to Low-Weight Knapsacks},
author = {Phong Q. Nguyen and Jacques Stern},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {41--58},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/313/313.pdf},
doi = {10.1007/11593447_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-76,
title = {Spreading Alerts Quietly and the Subgroup Escape Problem},
author = {James Aspnes and Zo\"e Diamadi and Kristian Gj\osteen and Ren\'e Peralta and Aleksandr Yampolskiy},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {253--272},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/76/76.pdf},
doi = {10.1007/11593447_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-87,
title = {Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations},
author = {Nuttapong Attrapadung and Hideki Imai},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {100--120},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/87/87.pdf},
doi = {10.1007/11593447_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-94,
title = {Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature)},
author = {Joonsang Baek and Reihaneh Safavi-Naini and Willy Susilo},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {644--661},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/94/94.pdf},
doi = {10.1007/11593447_35},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-357,
title = {Updatable Zero-Knowledge Databases},
author = {Moses Liskov},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {174--198},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/357/357.pdf},
doi = {10.1007/11593447_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-104,
title = {Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps},
author = {Paulo S. L. M. Barreto and Beno\^\it Libert and Noel McCullagh and Jean-Jacques Quisquater},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {515--532},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/104/104.pdf},
doi = {10.1007/11593447_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-362,
title = {Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log},
author = {Pascal Paillier and Damien Vergnaud},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {1--20},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/362/362.pdf},
doi = {10.1007/11593447_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-367,
title = {A Failure-Friendly Design Principle for Hash Functions},
author = {Stefan Lucks},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {474--494},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/367/367.pdf},
doi = {10.1007/11593447_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-378,
title = {A Practical Attack on the Fixed RC4 in the WEP Mode},
author = {Itsik Mantin},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {395--411},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/378/378.pdf},
doi = {10.1007/11593447_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-393,
title = {Fast Computation of Large Distributions and Its Cryptographic Applications},
author = {Alexander Maximov and Thomas Johansson},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {313--332},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/393/393.pdf},
doi = {10.1007/11593447_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-143,
title = {Examining Indistinguishability-Based Proof Models for Key Establishment Protocols},
author = {Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {585--604},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/143/143.pdf},
doi = {10.1007/11593447_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-145,
title = {Errors in Computational Complexity Proofs for Protocols},
author = {Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {624--643},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/145/145.pdf},
doi = {10.1007/11593447_34},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-147,
title = {Quantum Anonymous Transmissions},
author = {Matthias Christandl and Stephanie Wehner},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {217--235},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/147/147.pdf},
doi = {10.1007/11593447_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-149,
title = {An Analysis of the XSL Algorithm},
author = {Carlos Cid and Ga\"etan Leurent},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {333--352},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/149/149.pdf},
doi = {10.1007/11593447_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-414,
title = {Simple and Tight Bounds for Information Reconciliation and Privacy Amplification},
author = {Renato Renner and Stefan Wolf},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {199--216},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/414/414.pdf},
doi = {10.1007/11593447_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-419,
title = {A Near-Practical Attack Against B Mode of HBB},
author = {Joydip Mitra},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {412--424},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/419/419.pdf},
doi = {10.1007/11593447_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-175,
title = {Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains},
author = {Vassil S. Dimitrov and Laurent Imbert and Pradeep Kumar Mishra},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {59--78},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/175/175.pdf},
doi = {10.1007/11593447_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-449,
title = {Linear Cryptanalysis of the TSC Family of Stream Ciphers},
author = {Fr\'ed\'eric Muller and Thomas Peyrin},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {373--394},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/449/449.pdf},
doi = {10.1007/11593447_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-453,
title = {Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps},
author = {Toru Nakanishi and Nobuo Funabiki},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {533--548},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/453/453.pdf},
doi = {10.1007/11593447_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-211,
title = {Revealing Additional Information in Two-Party Computations},
author = {Andreas Jakoby and Maciej Liskiewicz},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {121--135},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/211/211.pdf},
doi = {10.1007/11593447_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-216,
title = {Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs},
author = {Craig Gentry and David Molnar and Zulfikar Ramzan},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {662--681},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/216/216.pdf},
doi = {10.1007/11593447_36},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-217,
title = {Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?},
author = {David Jao and Stephen D. Miller and Ramarathnam Venkatesan},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {21--40},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/217/217.pdf},
doi = {10.1007/11593447_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-224,
title = {Server-Aided Verification: Theory and Practice},
author = {Marc Girault and David Lefranc},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {605--623},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/224/224.pdf},
doi = {10.1007/11593447_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-484,
title = {Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes},
author = {Zhifang Zhang and Mulan Liu and Liangliang Xiao},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {156--173},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/484/484.pdf},
doi = {10.1007/11593447_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{asiacrypt-2005-254,
title = {Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application},
author = {Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai},
booktitle = {Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings},
volume = {3788},
pages = {495--514},
url = {http://www.iacr.org/cryptodb/archive/2005/ASIACRYPT/254/254.pdf},
doi = {10.1007/11593447_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-769,
title = {Using an RSA Accelerator for Modular Inversion},
author = {Martin Seysen},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {226--236},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/769/769.pdf},
doi = {10.1007/11545262_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-774,
title = {Data Remanence in Flash Memory Devices},
author = {Sergei P. Skorobogatov},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {339--353},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/774/774.pdf},
doi = {10.1007/11545262_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-785,
title = {Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings},
author = {Berk Sunar and David Cyganski},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {237--249},
doi = {10.1007/11545262_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-786,
title = {DPA Leakage Models for CMOS Logic Circuits},
author = {Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {366--382},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/786/786.pdf},
doi = {10.1007/11545262_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-790,
title = {Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment},
author = {Kris Tiri and David Hwang and Alireza Hodjat and Bo-Cheng Lai and Shenglin Yang and Patrick Schaumont and Ingrid Verbauwhede},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {354--365},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/790/790.pdf},
doi = {10.1007/11545262_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-571,
title = {Security Evaluation Against Electromagnetic Analysis at Design Time},
author = {Huiyun Li and A. Theodore Markettos and Simon W. Moore},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {280--292},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/571/571.pdf},
doi = {10.1007/11545262_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-583,
title = {Successfully Attacking Masked AES Hardware Implementations},
author = {Stefan Mangard and Norbert Pramstaller and Elisabeth Oswald},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {157--171},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/583/583.pdf},
doi = {10.1007/11545262_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@proceedings{ches-2005-584,
title = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
booktitle = {CHES},
volume = {3659},
url = {http://link.springer.com/book/10.1007/11545262},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-590,
title = {Templates as Master Keys},
author = {Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi and Kai Schramm},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {15--29},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/590/590.pdf},
doi = {10.1007/11545262_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-591,
title = {EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA},
author = {Catherine H. Gebotys and Simon Ho and C. C. Tiu},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {250--264},
doi = {10.1007/11545262_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-595,
title = {Energy-Efficient Software Implementation of Long Integer Modular Arithmetic},
author = {Johann Gro\sssch\"adl and Roberto Maria Avanzi and Erkay Savas and Stefan Tillich},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {75--90},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/595/595.pdf},
doi = {10.1007/11545262_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-603,
title = {The 'Backend Duplication' Method},
author = {Sylvain Guilley and Philippe Hoogvorst and Yves Mathieu and Renaud Pacalet},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {383--397},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/603/603.pdf},
doi = {10.1007/11545262_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-613,
title = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051\textmuP},
author = {Lejla Batina and David Hwang and Alireza Hodjat and Bart Preneel and Ingrid Verbauwhede},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {106--118},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/613/613.pdf},
doi = {10.1007/11545262_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-624,
title = {Fast Truncated Multiplication for Cryptographic Applications},
author = {Laszlo Hars},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {211--225},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/624/624.pdf},
doi = {10.1007/11545262_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-629,
title = {Design of Testable Random Bit Generators},
author = {Marco Bucci and Raimondo Luzzi},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {147--156},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/629/629.pdf},
doi = {10.1007/11545262_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-631,
title = {A Very Compact S-Box for AES},
author = {David Canright},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {441--455},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/631/631.pdf},
doi = {10.1007/11545262_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-641,
title = {SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers},
author = {Jens Franke and Thorsten Kleinjung and Christof Paar and Jan Pelzl and Christine Priplata and Colin Stahlke},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {119--130},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/641/641.pdf},
doi = {10.1007/11545262_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-661,
title = {On Second-Order Differential Power Analysis},
author = {Marc Joye and Pascal Paillier and Berry Schoenmakers},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {293--308},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/661/661.pdf},
doi = {10.1007/11545262_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-664,
title = {A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis},
author = {Jean-S\'ebastien Coron and David Lefranc and Guillaume Poupard},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {47--60},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/664/664.pdf},
doi = {10.1007/11545262_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-673,
title = {Bipartite Modular Multiplication},
author = {Marcelo E. Kaihara and Naofumi Takagi},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {201--210},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/673/673.pdf},
doi = {10.1007/11545262_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-674,
title = {Resistance of Randomized Projective Coordinates Against Power Analysis},
author = {William Dupuy and S\'ebastien Kunz-Jacques},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {1--14},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/674/674.pdf},
doi = {10.1007/11545262_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-683,
title = {Efficient Hardware for the Tate Pairing Calculation in Characteristic Three},
author = {Tim Kerins and William P. Marnane and Emanuel M. Popovici and Paulo S. L. M. Barreto},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {412--426},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/683/683.pdf},
doi = {10.1007/11545262_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-690,
title = {Masking at Gate Level in the Presence of Glitches},
author = {Wieland Fischer and Berndt M. Gammel},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {187--200},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/690/690.pdf},
doi = {10.1007/11545262_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-693,
title = {Security Limits for Compromising Emanations},
author = {Markus G. Kuhn},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {265--279},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/693/693.pdf},
doi = {10.1007/11545262_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-695,
title = {Secure Data Management in Trusted Computing},
author = {Ulrich K\"uhn and Klaus Kursawe and Stefan Lucks and Ahmad-Reza Sadeghi and Christian St\"uble},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {324--338},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/695/695.pdf},
doi = {10.1007/11545262_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-700,
title = {Further Hidden Markov Model Cryptanalysis},
author = {P. J. Green and Richard Noad and Nigel P. Smart},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {61--74},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/700/700.pdf},
doi = {10.1007/11545262_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-702,
title = {Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization},
author = {Willi Geiselmann and Adi Shamir and Rainer Steinwandt and Eran Tromer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {131--146},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/702/702.pdf},
doi = {10.1007/11545262_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-710,
title = {AES on FPGA from the Fastest to the Smallest},
author = {Tim Good and Mohammed Benaissa},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {427--440},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/710/710.pdf},
doi = {10.1007/11545262_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-718,
title = {Hardware Acceleration of the Tate Pairing in Characteristic Three},
author = {Philipp Grabher and Dan Page},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {398--411},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/718/718.pdf},
doi = {10.1007/11545262_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-737,
title = {Short Memory Scalar Multiplication on Koblitz Curves},
author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {91--105},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/737/737.pdf},
doi = {10.1007/11545262_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-747,
title = {Improved Higher-Order Side-Channel Attacks with FPGA Experiments},
author = {Eric Peeters and Fran\c cois-Xavier Standaert and Nicolas Donckers and Jean-Jacques Quisquater},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {309--323},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/747/747.pdf},
doi = {10.1007/11545262_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-750,
title = {Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints},
author = {Thomas Popp and Stefan Mangard},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {172--186},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/750/750.pdf},
doi = {10.1007/11545262_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{ches-2005-766,
title = {A Stochastic Model for Differential Side Channel Cryptanalysis},
author = {Werner Schindler and Kerstin Lemke and Christof Paar},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
volume = {3659},
pages = {30--46},
url = {http://www.iacr.org/cryptodb/archive/2005/CHES/766/766.pdf},
doi = {10.1007/11545262_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1809,
title = {Secure Communications over Insecure Channels Based on Short Authenticated Strings},
author = {Serge Vaudenay},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {309--326},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1809/1809.pdf},
doi = {10.1007/11535218_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1298,
title = {Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors},
author = {Marc Fischlin},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {152--168},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1298/1298.pdf},
doi = {10.1007/11535218_10},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1567,
title = {A Practical Attack on a Braid Group Based Cryptographic Protocol},
author = {Alexei G. Myasnikov and Vladimir Shpilrain and Alexander Ushakov},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {86--96},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1567/1567.pdf},
doi = {10.1007/11535218_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1825,
title = {Efficient Collision Search Attacks on SHA-0},
author = {Xiaoyun Wang and Hongbo Yu and Yiqun Lisa Yin},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {1--16},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1825/1825.pdf},
doi = {10.1007/11535218_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1058,
title = {Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes},
author = {Alexandra Boldyreva and Marc Fischlin},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {412--429},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1058/1058.pdf},
doi = {10.1007/11535218_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1826,
title = {Finding Collisions in the Full SHA-1},
author = {Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {17--36},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1826/1826.pdf},
doi = {10.1007/11535218_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1580,
title = {The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption},
author = {Yi Lu 0002 and Willi Meier and Serge Vaudenay},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {97--117},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1580/1580.pdf},
doi = {10.1007/11535218_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1839,
title = {New Monotones and Lower Bounds in Unconditional Two-Party Computation},
author = {Stefan Wolf and J\"urg Wullschleger},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {467--477},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1839/1839.pdf},
doi = {10.1007/11535218_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1074,
title = {Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys},
author = {Dan Boneh and Craig Gentry and Brent Waters},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {258--275},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1074/1074.pdf},
doi = {10.1007/11535218_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1091,
title = {A Formal Treatment of Onion Routing},
author = {Jan Camenisch and Anna Lysyanskaya},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {169--187},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1091/1091.pdf},
doi = {10.1007/11535218_11},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1374,
title = {On the Discrete Logarithm Problem on Algebraic Tori},
author = {Robert Granger and Frederik Vercauteren},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {66--85},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1374/1374.pdf},
doi = {10.1007/11535218_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1658,
title = {Private Searching on Streaming Data},
author = {Rafail Ostrovsky and William E. Skeith III},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {223--240},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1658/1658.pdf},
doi = {10.1007/11535218_14},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1147,
title = {An Efficient CDH-Based Signature Scheme with a Tight Security Reduction},
author = {Beno\^\it Chevallier-Mames},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {511--526},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1147/1147.pdf},
doi = {10.1007/11535218_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1663,
title = {Unconditional Characterizations of Non-interactive Zero-Knowledge},
author = {Rafael Pass and Abhi Shelat},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {118--134},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1663/1663.pdf},
doi = {10.1007/11535218_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1408,
title = {One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption},
author = {Thomas Holenstein and Renato Renner},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {478--493},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1408/1408.pdf},
doi = {10.1007/11535218_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1672,
title = {Simple and Efficient Shuffling with Provable Correctness and ZK Privacy},
author = {Kun Peng and Colin Boyd and Ed Dawson},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {188--204},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1672/1672.pdf},
doi = {10.1007/11535218_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1675,
title = {Composition Does Not Imply Adaptive Security},
author = {Krzysztof Pietrzak},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {55--65},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1675/1675.pdf},
doi = {10.1007/11535218_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1420,
title = {Generic Transformation for Scalable Broadcast Encryption Schemes},
author = {Jung Yeon Hwang and Dong Hoon Lee and Jongin Lim},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {276--292},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1420/1420.pdf},
doi = {10.1007/11535218_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@proceedings{crypto-2005-918,
title = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
booktitle = {CRYPTO},
volume = {3621},
url = {http://link.springer.com/book/10.1007/11535218},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-927,
title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions},
author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone-Lee and Gregory Neven and Pascal Paillier and Haixia Shi},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {205--222},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/927/927.pdf},
doi = {10.1007/11535218_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1184,
title = {Merkle-Damg\r ard Revisited: How to Construct a Hash Function},
author = {Jean-S\'ebastien Coron and Yevgeniy Dodis and C\'ecile Malinaud and Prashant Puniya},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {430--448},
doi = {10.1007/11535218_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1443,
title = {Privacy-Preserving Set Operations},
author = {Lea Kissner and Dawn Xiaodong Song},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {241--257},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1443/1443.pdf},
doi = {10.1007/11535218_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1193,
title = {On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes},
author = {Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jim\'enez Urroz and Gregor Leander and Jaume Mart\'\i-Farr\'e and Carles Padr\'o},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {327--343},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1193/1193.pdf},
doi = {10.1007/11535218_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1196,
title = {Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields},
author = {Ronald Cramer and Serge Fehr and Martijn Stam},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {344--360},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1196/1196.pdf},
doi = {10.1007/11535218_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-960,
title = {Impossibility and Feasibility Results for Zero Knowledge with Public Keys},
author = {Jo\"el Alwen and Giuseppe Persiano and Ivan Visconti},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {135--151},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/960/960.pdf},
doi = {10.1007/11535218_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1218,
title = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator},
author = {Ivan Damg\r ard and Yuval Ishai},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {378--394},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1218/1218.pdf},
doi = {10.1007/11535218_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-963,
title = {Improved Security Analyses for CBC MACs},
author = {Mihir Bellare and Krzysztof Pietrzak and Phillip Rogaway},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {527--545},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/963/963.pdf},
doi = {10.1007/11535218_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1478,
title = {Authenticating Pervasive Devices with Human Protocols},
author = {Ari Juels and Stephen A. Weis},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {293--308},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1478/1478.pdf},
doi = {10.1007/11535218_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1224,
title = {A Quantum Cipher with Near Optimal Key-Recycling},
author = {Ivan Damg\r ard and Thomas Brochmann Pedersen and Louis Salvail},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {494--510},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1224/1224.pdf},
doi = {10.1007/11535218_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1497,
title = {HMQV: A High-Performance Secure Diffie-Hellman Protocol},
author = {Hugo Krawczyk},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {546--566},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1497/1497.pdf},
doi = {10.1007/11535218_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-986,
title = {Secure Computation Without Authentication},
author = {Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {361--377},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/986/986.pdf},
doi = {10.1007/11535218_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-996,
title = {Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems},
author = {Omer Barkol and Yuval Ishai},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {395--411},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/996/996.pdf},
doi = {10.1007/11535218_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1260,
title = {On the Generic Insecurity of the Full Domain Hash},
author = {Yevgeniy Dodis and Roberto Oliveira and Krzysztof Pietrzak},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {449--466},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1260/1260.pdf},
doi = {10.1007/11535218_27},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{crypto-2005-1270,
title = {Pebbling and Proofs of Work},
author = {Cynthia Dwork and Moni Naor and Hoeteck Wee},
booktitle = {Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings},
volume = {3621},
pages = {37--54},
url = {http://www.iacr.org/cryptodb/archive/2005/CRYPTO/1270/1270.pdf},
doi = {10.1007/11535218_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2049,
title = {Collisions of SHA-0 and Reduced SHA-1},
author = {Eli Biham and Rafi Chen and Antoine Joux and Patrick Carribault and Christophe Lemuet and William Jalby},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {36--57},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2049/2049.pdf},
doi = {10.1007/11426639_3},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2053,
title = {Related-Key Boomerang and Rectangle Attacks},
author = {Eli Biham and Orr Dunkelman and Nathan Keller},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {507--525},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2053/2053.pdf},
doi = {10.1007/11426639_30},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2067,
title = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions},
author = {John Black and Martin Cochran and Thomas Shrimpton},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {526--541},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2067/2067.pdf},
doi = {10.1007/11426639_31},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2339,
title = {Partial Key Exposure Attacks on RSA up to Full Size Exponents},
author = {Matthias Ernst and Ellen Jochemsz and Alexander May and Benne de Weger},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {371--386},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2339/2339.pdf},
doi = {10.1007/11426639_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2597,
title = {Predicting and Distinguishing Attacks on RC4 Keystream Generator},
author = {Itsik Mantin},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {491--506},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2597/2597.pdf},
doi = {10.1007/11426639_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2602,
title = {Floating-Point LLL Revisited},
author = {Phong Q. Nguyen and Damien Stehl\'e},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {215--233},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2602/2602.pdf},
doi = {10.1007/11426639_13},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2098,
title = {Secure Remote Authentication Using Biometric Data},
author = {Xavier Boyen and Yevgeniy Dodis and Jonathan Katz and Rafail Ostrovsky and Adam Smith},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {147--163},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2098/2098.pdf},
doi = {10.1007/11426639_9},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2866,
title = {Cryptanalysis of the Hash Functions MD4 and RIPEMD},
author = {Xiaoyun Wang and Xuejia Lai and Dengguo Feng and Hui Chen and Xiuyuan Yu},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {1--18},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2866/2866.pdf},
doi = {10.1007/11426639_1},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2868,
title = {How to Break MD5 and Other Hash Functions},
author = {Xiaoyun Wang and Hongbo Yu},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {19--35},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2868/2868.pdf},
doi = {10.1007/11426639_2},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2869,
title = {Efficient Identity-Based Encryption Without Random Oracles},
author = {Brent Waters},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {114--127},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2869/2869.pdf},
doi = {10.1007/11426639_7},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2107,
title = {Mercurial Commitments with Applications to Zero-Knowledge Sets},
author = {Melissa Chase and Alexander Healy and Anna Lysyanskaya and Tal Malkin and Leonid Reyzin},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {422--439},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2107/2107.pdf},
doi = {10.1007/11426639_25},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2373,
title = {Differential Cryptanalysis for Multivariate Schemes},
author = {Pierre-Alain Fouque and Louis Granboulan and Jacques Stern},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {341--353},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2373/2373.pdf},
doi = {10.1007/11426639_20},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2411,
title = {One-Way Chain Based Broadcast Encryption Schemes},
author = {Nam-Su Jho and Jung Yeon Hwang and Jung Hee Cheon and Myung-Hwan Kim and Dong Hoon Lee and Eun Sun Yoo},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {559--574},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2411/2411.pdf},
doi = {10.1007/11426639_33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2667,
title = {The RSA Group is Pseudo-Free},
author = {Daniele Micciancio},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {387--403},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2667/2667.pdf},
doi = {10.1007/11426639_23},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2178,
title = {Compact E-Cash},
author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {302--321},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2178/2178.pdf},
doi = {10.1007/11426639_18},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2434,
title = {Reducing Complexity Assumptions for Statistically-Hiding Commitment},
author = {Iftach Haitner and Omer Horvitz and Jonathan Katz and Chiu-Yuen Koo and Ruggero Morselli and Ronen Shaltiel},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {58--77},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2434/2434.pdf},
doi = {10.1007/11426639_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2695,
title = {A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem},
author = {Ludovic Perret},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {354--370},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2695/2695.pdf},
doi = {10.1007/11426639_21},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2440,
title = {On Robust Combiners for Oblivious Transfer and Other Primitives},
author = {Danny Harnik and Joe Kilian and Moni Naor and Omer Reingold and Alon Rosen},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {96--113},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2440/2440.pdf},
doi = {10.1007/11426639_6},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-1930,
title = {A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers},
author = {Johannes Bl\"omer and Alexander May},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {251--267},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/1930/1930.pdf},
doi = {10.1007/11426639_15},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2443,
title = {Smooth Projective Hashing and Two-Message Oblivious Transfer},
author = {Yael Tauman Kalai},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {78--95},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2443/2443.pdf},
doi = {10.1007/11426639_5},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@proceedings{eurocrypt-2005-1941,
title = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
booktitle = {EUROCRYPT},
volume = {3494},
url = {http://link.springer.com/book/10.1007/b136415},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2202,
title = {Universally Composable Password-Based Key Exchange},
author = {Ran Canetti and Shai Halevi and Jonathan Katz and Yehuda Lindell and Philip D. MacKenzie},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {404--421},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2202/2202.pdf},
doi = {10.1007/11426639_24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2459,
title = {Computational Indistinguishability Between Quantum States and Its Cryptographic Application},
author = {Akinori Kawachi and Takeshi Koshiba and Harumichi Nishimura and Tomoyuki Yamakami},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {268--284},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2459/2459.pdf},
doi = {10.1007/11426639_16},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-1952,
title = {Hierarchical Identity Based Encryption with Constant Size Ciphertext},
author = {Dan Boneh and Xavier Boyen and Eu-Jin Goh},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {440--456},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/1952/1952.pdf},
doi = {10.1007/11426639_26},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2213,
title = {Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes},
author = {Claude Cr\'epeau and Daniel Gottesman and Adam Smith},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {285--301},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2213/2213.pdf},
doi = {10.1007/11426639_17},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2469,
title = {Second Preimages on n-Bit Hash Functions for Much Less than 2^{n} Work},
author = {John Kelsey and Bruce Schneier},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {474--490},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2469/2469.pdf},
doi = {10.1007/11426639_28},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2470,
title = {Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract)},
author = {Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {322--340},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2470/2470.pdf},
doi = {10.1007/11426639_19},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2225,
title = {Public Traceability in Traitor Tracing Schemes},
author = {Herv\'e Chabanne and Duong Hieu Phan and David Pointcheval},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {542--558},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2225/2225.pdf},
doi = {10.1007/11426639_32},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2485,
title = {Group Signatures with Efficient Concurrent Join},
author = {Aggelos Kiayias and Moti Yung},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {198--214},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/2485/2485.pdf},
doi = {10.1007/11426639_12},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-1985,
title = {Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM},
author = {Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa and Victor Shoup},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings},
volume = {3494},
pages = {128--146},
url = {http://www.iacr.org/cryptodb/archive/2005/EUROCRYPT/1985/1985.pdf},
doi = {10.1007/11426639_8},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2005}
}
@inproceedings{eurocrypt-2005-2002,
title = {Stronger Security Bounds for Wegman-Carter-Shoup Authenticators},
author = {Daniel J. Bernstein},
booktitle = {Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus