IACR
Home
Call for Papers
Submission
Accepted Papers
Program
Proceedings
Venue
Accommodation
Travel Info
Registration
Sponsors
Contact
Related events
 

List of Accepted Papers

  1. Relations Among Notions of Plaintext Awareness
    James Birkett and Alexander W. Dent
    Affiliations: Royal Holloway, University of London
     
  2. Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?
    Alexander May and Maike Ritzenhofen
    Affiliations: Ruhr-Universität Bochum
     
  3. An analysis of the vector decomposition problem
    Steven D. Galbraith and Eric R. Verheul
    Affiliations: Royal Holloway University of London and PricewaterhouseCoopers
     
  4. Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
    Yi-Ru Liu and Wen-Guey Tzeng
    Affiliations: Department of Computer Science, National Chiao Tung University
     
  5. Proxy Signatures Secure Against Proxy Key Exposure
    Jacob C. N. Schuldt and Kanta Matsuura and Kenneth G. Paterson
    Affiliations: Institute of Industrial Science, University of Tokyo and Royal Holloway, University of London
     
  6. Certificateless Encryption Schemes Strongly Secure in the Standard Model
    Alexander W Dent and Benoit Libert and Kenneth G. Paterson
    Affiliations: Royal Holloway, University of London, and Université Catholique de Louvain
     
  7. New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields
    Patrick Longa and Ali Miri
    Affiliations: University of Ottawa, Ottawa
     
  8. SAS-Based Group Authentication and Key Agreement Protocols
    Sven Laur and Sylvain Pasini
    Affiliations: Helsinki University of Technology and EPFL, Lausanne
     
  9. Security of Digital Signature Schemes in Weakened Random Oracle Models
    Akira Numayama and Toshiyuki Isshiki and Keisuke Tanaka
    Affiliations: Tokyo Institute of Technology and NEC Corporation and Tokyo Institute of Technology
     
  10. Online Untransferable Signatures
    Moses Liskov and Silvio Micali
    Affiliations: The College of William and Mary and MIT CSAIL
     
  11. Efficient Simultaneous Broadcast
    Sebastian Faust and Emilia Kasper and Stefan Lucks
    Affiliations: Katholieke Universiteit Leuven, ESAT-COSIC and Bauhaus-Universitat Weimar
     
  12. Recovering NTRU Secret Key From Inversion Oracles
    Petros Mol and Moti Yung
    Affiliations: University of California, San Diego and Google Inc., Columbia University
     
  13. Lattice-Based Identification Schemes Secure Under Active Attacks
    Vadim Lyubashevsky
    Affiliations: University of California, San Diego
     
  14. A Digital Signature Scheme based on $CVP_\infty$
    Thomas Plantard and Willy Susilo and Khin Than Win
    Affiliations: University of Wollongong
     
  15. Off-Line/On-Line Signatures: Theoretical aspects and Experimental Results
    Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro
    Affiliations: University of Catania, IBM Research
     
  16. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Benoit Libert and Damien Vergnaud
    Affiliations: UCL Crypto Group and École Normale Supérieure
     
  17. A Parameterized Splitting System and its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents
    Sungwook Kim and Jung Hee Cheon
    Affiliations: Department of Mathematics and ISaC-RIM, Seoul National University
     
  18. An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm
    Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek El-Ghazawi
    Affiliations: The George Washington University, George Mason University, Sungkyunkwan University
     
  19. Total Break of the $\ell$-IC Signature Scheme
    P.A. Fouque and G. Macariorat and L. Perret and J. Stern
    Affiliations: ENS, FT R&D, Univ. Paris VI
     
  20. Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
    Siamak F Shahandashti and Reihaneh Safavi-Naini
    Affiliations: Centre for Computer and Information Security Research, University of Wollongong and iCORE Information Security Lab, University of Calgary
     
  21. Completely Non-Malleable Encryption Revisited
    Carmine Ventre and Ivan Visconti
    Affiliations: University of Salerno
     
Last updated: Mar 13 12:24:56 2008 by jvillar (at) ma4.upc.edu
Valid HTML 4.01 Transitional   Valid CSS