CRYPTO A*

37 papers

YearTitle / Authors
2006A Method for Making Password-Based Key Exchange Resilient to Server Compromise.
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
2006Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings
Cynthia Dwork
2006Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields.
Hao Chen, Ronald Cramer
2006Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).
Xavier Boyen, Brent Waters
2006Asymptotically Optimal Two-Round Perfectly Secure Message Transmission.
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
2006Automated Security Proofs with Sequences of Games.
Bruno Blanchet, David Pointcheval
2006Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
2006Cryptanalysis of 2R
Jean-Charles Faugère, Ludovic Perret
2006Cryptographic Protocols for Electronic Voting.
David A. Wagner
2006Fast Algorithms for the Free Riders Problem in Broadcast Encryption.
Zulfikar Ramzan, David P. Woodruff
2006Inverting HFE Is Quasipolynomial.
Louis Granboulan, Antoine Joux, Jacques Stern
2006Lattice-Based Cryptography.
Oded Regev
2006Mitigating Dictionary Attacks on Password-Protected Local Storage.
Ran Canetti, Shai Halevi, Michael Steiner
2006New Proofs for NMAC and HMAC: Security without collision-resistance.
Mihir Bellare
2006Non-interactive Zaps and New Techniques for NIZK.
Jens Groth, Rafail Ostrovsky, Amit Sahai
2006Oblivious Transfer and Linear Functions.
Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
2006On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2006On Expected Constant-Round Protocols for Byzantine Agreement.
Jonathan Katz, Chiu-Yuen Koo
2006On Forward-Secure Storage.
Stefan Dziembowski
2006On Robust Combiners for Private Information Retrieval and Other Primitives.
Remo Meier, Bartosz Przydatek
2006On Signatures of Knowledge.
Melissa Chase, Anna Lysyanskaya
2006On the Higher Order Nonlinearities of Algebraic Immune Functions.
Claude Carlet
2006On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.
Dan Boneh, Xavier Boyen
2006On the Power of the Randomized Iterate.
Iftach Haitner, Danny Harnik, Omer Reingold
2006Random Selection with an Adversarial Majority.
Ronen Gradwohl, Salil P. Vadhan, David Zuckerman
2006Rankin's Constant and Blockwise Lattice Reduction.
Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen
2006Rationality and Adversarial Behavior in Multi-party Computation.
Anna Lysyanskaya, Nikos Triandopoulos
2006Receipt-Free Universally-Verifiable Voting with Everlasting Privacy.
Tal Moran, Moni Naor
2006Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.
Elad Barkan, Eli Biham, Adi Shamir
2006Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.
Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam D. Smith
2006Robust Multiparty Computation with Linear Communication Complexity.
Martin Hirt, Jesper Buus Nielsen
2006Round-Optimal Composable Blind Signatures in the Common Reference String Model.
Marc Fischlin
2006Scalable Secure Multiparty Computation.
Ivan Damgård, Yuval Ishai
2006Strengthening Digital Signatures Via Randomized Hashing.
Shai Halevi, Hugo Krawczyk
2006The Number Field Sieve in the Medium Prime Case.
Antoine Joux, Reynald Lercier, Nigel P. Smart, Frederik Vercauteren
2006Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
Moni Naor, Gil Segev, Adam D. Smith
2006When Random Sampling Preserves Privacy.
Kamalika Chaudhuri, Nina Mishra