CRYPTO A*

34 papers

YearTitle / Authors
2005A Formal Treatment of Onion Routing.
Jan Camenisch, Anna Lysyanskaya
2005A Practical Attack on a Braid Group Based Cryptographic Protocol.
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov
2005A Quantum Cipher with Near Optimal Key-Recycling.
Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail
2005Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings
Victor Shoup
2005An Efficient CDH-Based Signature Scheme with a Tight Security Reduction.
Benoît Chevallier-Mames
2005Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
Alexandra Boldyreva, Marc Fischlin
2005Authenticating Pervasive Devices with Human Protocols.
Ari Juels, Stephen A. Weis
2005Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields.
Ronald Cramer, Serge Fehr, Martijn Stam
2005Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
Dan Boneh, Craig Gentry, Brent Waters
2005Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors.
Marc Fischlin
2005Composition Does Not Imply Adaptive Security.
Krzysztof Pietrzak
2005Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator.
Ivan Damgård, Yuval Ishai
2005Efficient Collision Search Attacks on SHA-0.
Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
2005Finding Collisions in the Full SHA-1.
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
2005Generic Transformation for Scalable Broadcast Encryption Schemes.
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
2005HMQV: A High-Performance Secure Diffie-Hellman Protocol.
Hugo Krawczyk
2005Impossibility and Feasibility Results for Zero Knowledge with Public Keys.
Joël Alwen, Giuseppe Persiano, Ivan Visconti
2005Improved Security Analyses for CBC MACs.
Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway
2005Merkle-Damgård Revisited: How to Construct a Hash Function.
Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
2005New Monotones and Lower Bounds in Unconditional Two-Party Computation.
Stefan Wolf, Jürg Wullschleger
2005On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes.
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró
2005On the Discrete Logarithm Problem on Algebraic Tori.
Robert Granger, Frederik Vercauteren
2005On the Generic Insecurity of the Full Domain Hash.
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak
2005One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption.
Thomas Holenstein, Renato Renner
2005Pebbling and Proofs of Work.
Cynthia Dwork, Moni Naor, Hoeteck Wee
2005Privacy-Preserving Set Operations.
Lea Kissner, Dawn Xiaodong Song
2005Private Searching on Streaming Data.
Rafail Ostrovsky, William E. Skeith III
2005Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
2005Secure Communications over Insecure Channels Based on Short Authenticated Strings.
Serge Vaudenay
2005Secure Computation Without Authentication.
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
2005Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems.
Omer Barkol, Yuval Ishai
2005Simple and Efficient Shuffling with Provable Correctness and ZK Privacy.
Kun Peng, Colin Boyd, Ed Dawson
2005The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption.
Yi Lu, Willi Meier, Serge Vaudenay
2005Unconditional Characterizations of Non-interactive Zero-Knowledge.
Rafael Pass, Abhi Shelat