IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of PKC 2006

Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings , Springer
New Attacks on RSA with Small Secret CRT-Exponents., Daniel Bleichenbacher, Alexander May, pp. 1-13
 PDF  postscript BibTeX
An Attack on a Modified Niederreiter Encryption Scheme., Christian Wieschebrink, pp. 14-26
 PDF  postscript BibTeX
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm., Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern, pp. 27-43
 PDF  postscript BibTeX
Efficient Polynomial Operations in the Shared-Coefficients Setting., Payman Mohassel, Matthew K. Franklin, pp. 44-57
 PDF  postscript BibTeX
Generic On-Line/Off-Line Threshold Signatures., Chris Crutchfield, David Molnar, David Turner, David Wagner, pp. 58-74
 PDF  postscript BibTeX
Linear Integer Secret Sharing and Distributed Exponentiation., Ivan Damgård, Rune Thorbek, pp. 75-90
 PDF  postscript BibTeX
Encoding-Free ElGamal Encryption Without Random Oracles., Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval, pp. 91-104
 PDF  postscript BibTeX
Parallel Key-Insulated Public Key Encryption., Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai, pp. 105-122
 PDF  postscript BibTeX
Provably Secure Steganography with Imperfect Sampling., Anna Lysyanskaya, Mira Meyerovich, pp. 123-139
 PDF  postscript BibTeX
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited., Ilya Mironov, pp. 140-156
 PDF  postscript BibTeX
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption., Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang, pp. 157-173
 PDF  postscript BibTeX
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve., An Commeine, Igor Semaev, pp. 174-190
 PDF  postscript BibTeX
Efficient Scalar Multiplication by Isogeny Decompositions., Christophe Doche, Thomas Icart, David R. Kohel, pp. 191-206
 PDF  postscript BibTeX
Curve25519: New Diffie-Hellman Speed Records., Daniel J. Bernstein, pp. 207-228
 PDF  postscript BibTeX
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman., Dan Boneh, Emily Shen, Brent Waters, pp. 229-240
 PDF  postscript BibTeX
Generalization of the Selective-ID Security Model for HIBE Protocols., Sanjit Chatterjee, Palash Sarkar, pp. 241-256
 PDF  postscript BibTeX
Identity-Based Aggregate Signatures., Craig Gentry, Zulfikar Ramzan, pp. 257-273
 postscript BibTeX
On the Limitations of the Spread of an IBE-to-PKE Transformation., Eike Kiltz, pp. 274-289
 PDF  postscript BibTeX
Inoculating Multivariate Schemes Against Differential Attacks., Jintai Ding, Jason E. Gower, pp. 290-301
 PDF  postscript BibTeX
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol., Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov, pp. 302-314
 postscript BibTeX
High-Order Attacks Against the Exponent Splitting Protection., Frédéric Muller, Frédéric Valette, pp. 315-329
 PDF  postscript BibTeX
New Online/Offline Signature Schemes Without Random Oracles., Kaoru Kurosawa, Katja Schmidt-Samoa, pp. 330-346
 PDF  postscript BibTeX
Anonymous Signature Schemes., Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang, pp. 347-363
 PDF  postscript BibTeX
The Power of Identification Schemes., Kaoru Kurosawa, Swee-Huay Heng, pp. 364-377
 PDF  postscript BibTeX
Security Analysis of KEA Authenticated Key Exchange Protocol., Kristin Lauter, Anton Mityagin, pp. 378-394
 PDF  postscript BibTeX
SAS-Based Authenticated Key Agreement., Sylvain Pasini, Serge Vaudenay, pp. 395-409
 postscript BibTeX
The Twist-AUgmented Technique for Key Exchange., Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval, pp. 410-426
 PDF  postscript BibTeX
Password-Based Group Key Exchange in a Constant Number of Rounds., Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval, pp. 427-442
 PDF  postscript BibTeX
Conditional Oblivious Cast., Cheng-Kang Chu, Wen-Guey Tzeng, pp. 443-457
 BibTeX
Efficiency Tradeoffs for Malicious Two-Party Computation., Payman Mohassel, Matthew K. Franklin, pp. 458-473
 PDF BibTeX
On Constructing Certificateless Cryptosystems from Identity Based Encryption., Benoît Libert, Jean-Jacques Quisquater, pp. 474-490
 PDF  postscript BibTeX
Building Better Signcryption Schemes with Tag-KEMs., Tor E. Bjørstad, Alexander W. Dent, pp. 491-507
 PDF  postscript BibTeX
Security-Mediated Certificateless Cryptography., Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto, pp. 508-524
 PDF  postscript BibTeX
k-Times Anonymous Authentication with a Constant Proving Cost., Isamu Teranishi, Kazue Sako, pp. 525-542
 PDF  postscript BibTeX

[ IACR home page ] © IACR