IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of CRYPTO 2006

Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings , Springer
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs., Elad Barkan, Eli Biham, Adi Shamir, pp. 1-21
 PDF  postscript BibTeX
On the Power of the Randomized Iterate., Iftach Haitner, Danny Harnik, Omer Reingold, pp. 22-40
 PDF  postscript BibTeX
Strengthening Digital Signatures Via Randomized Hashing., Shai Halevi, Hugo Krawczyk, pp. 41-59
 PDF  postscript BibTeX
Round-Optimal Composable Blind Signatures in the Common Reference String Model., Marc Fischlin, pp. 60-77
 PDF  postscript BibTeX
On Signatures of Knowledge., Melissa Chase, Anna Lysyanskaya, pp. 78-96
 PDF  postscript BibTeX
Non-interactive Zaps and New Techniques for NIZK., Jens Groth, Rafail Ostrovsky, Amit Sahai, pp. 97-111
 PDF  postscript BibTeX
Rankin's Constant and Blockwise Lattice Reduction., Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen, pp. 112-130
 PDF  postscript BibTeX
Lattice-Based Cryptography., Oded Regev, pp. 131-141
 PDF  postscript BibTeX
A Method for Making Password-Based Key Exchange Resilient to Server Compromise., Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan, pp. 142-159
 PDF  postscript BibTeX
Mitigating Dictionary Attacks on Password-Protected Local Storage., Ran Canetti, Shai Halevi, Michael Steiner, pp. 160-179
 PDF  postscript BibTeX
Rationality and Adversarial Behavior in Multi-party Computation., Anna Lysyanskaya, Nikos Triandopoulos, pp. 180-197
 PDF  postscript BibTeX
When Random Sampling Preserves Privacy., Kamalika Chaudhuri, Nina Mishra, pp. 198-213
 PDF  postscript BibTeX
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models., Moni Naor, Gil Segev, Adam Smith, pp. 214-231
 PDF  postscript BibTeX
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets., Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith, pp. 232-250
 PDF  postscript BibTeX
On Forward-Secure Storage., Stefan Dziembowski, pp. 251-270
 PDF  postscript BibTeX
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One., Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan, pp. 271-289
 PDF  postscript BibTeX
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)., Xavier Boyen, Brent Waters, pp. 290-307
 PDF  postscript BibTeX
Fast Algorithms for the Free Riders Problem in Broadcast Encryption., Zulfikar Ramzan, David P. Woodruff, pp. 308-325
 PDF  postscript BibTeX
The Number Field Sieve in the Medium Prime Case., Antoine Joux, Reynald Lercier, Nigel P. Smart, Frederik Vercauteren, pp. 326-344
 PDF  postscript BibTeX
Inverting HFE Is Quasipolynomial., Louis Granboulan, Antoine Joux, Jacques Stern, pp. 345-356
 PDF  postscript BibTeX
Cryptanalysis of 2R- Schemes., Jean-Charles Faugère, Ludovic Perret, pp. 357-372
 PDF BibTeX
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy., Tal Moran, Moni Naor, pp. 373-392
 PDF  postscript BibTeX
Cryptographic Protocols for Electronic Voting., David Wagner, pp. 393
 PDF  postscript BibTeX
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission., Saurabh Agarwal, Ronald Cramer, Robbert de Haan, pp. 394-408
 PDF  postscript BibTeX
Random Selection with an Adversarial Majority., Ronen Gradwohl, Salil P. Vadhan, David Zuckerman, pp. 409-426
 PDF  postscript BibTeX
Oblivious Transfer and Linear Functions., Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner, pp. 427-444
 PDF  postscript BibTeX
On Expected Constant-Round Protocols for Byzantine Agreement., Jonathan Katz, Chiu-Yuen Koo, pp. 445-462
 PDF  postscript BibTeX
Robust Multiparty Computation with Linear Communication Complexity., Martin Hirt, Jesper Buus Nielsen, pp. 463-482
 PDF  postscript BibTeX
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation., Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank, pp. 483-500
 PDF  postscript BibTeX
Scalable Secure Multiparty Computation., Ivan Damgård, Yuval Ishai, pp. 501-520
 PDF  postscript BibTeX
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields., Hao Chen, Ronald Cramer, pp. 521-536
 PDF  postscript BibTeX
Automated Security Proofs with Sequences of Games., Bruno Blanchet, David Pointcheval, pp. 537-554
 PDF  postscript BibTeX
On Robust Combiners for Private Information Retrieval and Other Primitives., Remo Meier, Bartosz Przydatek, pp. 555-569
 PDF  postscript BibTeX
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions., Dan Boneh, Xavier Boyen, pp. 570-583
 PDF  postscript BibTeX
On the Higher Order Nonlinearities of Algebraic Immune Functions., Claude Carlet, pp. 584-601
 PDF  postscript BibTeX
New Proofs for., Mihir Bellare, pp. 602-619
 PDF  postscript BibTeX

[ IACR home page ] © IACR