CRYPTO A*

35 papers

YearTitle / Authors
2007A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.
Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi
2007A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU.
Nick Howgrave-Graham
2007A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra.
Ronald Cramer, Eike Kiltz, Carles Padró
2007A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than
Ellen Jochemsz, Alexander May
2007A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator.
Daniel R. L. Brown, Kristian Gjøsteen
2007A Tight High-Order Entropic Quantum Uncertainty Relation with Applications.
Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
2007Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings
Alfred Menezes
2007Amplifying Collision Resistance: A Complexity-Theoretic Treatment.
Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee
2007Chernoff-Type Direct Product Theorems.
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets
2007Cryptography in the Multi-string Model.
Jens Groth, Rafail Ostrovsky
2007Cryptography with Constant Input Locality.
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
2007Deterministic and Efficiently Searchable Encryption.
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
2007Domain Extension of Public Random Functions: Beyond the Birthday Barrier.
Ueli M. Maurer, Stefano Tessaro
2007Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach.
Jean-Sébastien Coron
2007Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen
2007Hash Functions and the (Amplified) Boomerang Attack.
Antoine Joux, Thomas Peyrin
2007How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
2007How Should We Solve Search Problems Privately?
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb
2007Improved Analysis of Kannan's Shortest Lattice Vector Algorithm.
Guillaume Hanrot, Damien Stehlé
2007Indistinguishability Amplification.
Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner
2007Information Security Economics - and Beyond.
Ross J. Anderson, Tyler Moore
2007Invertible Universal Hashing and the TET Encryption Mode.
Shai Halevi
2007On Secure Multi-party Computation in Black-Box Groups.
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang
2007Pirate Evolution: How to Make the Most of Your Traitor Keys.
Aggelos Kiayias, Serdar Pehlivanoglu
2007Practical Cryptanalysis of SFLASH.
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
2007Public Key Encryption That Allows PIR Queries.
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
2007Random Oracles and Auxiliary Input.
Dominique Unruh
2007Reducing Trust in the PKG in Identity Based Cryptosystems.
Vipul Goyal
2007Rerandomizable RCCA Encryption.
Manoj Prabhakaran, Mike Rosulek
2007Scalable and Unconditionally Secure Multiparty Computation.
Ivan Damgård, Jesper Buus Nielsen
2007Secure Hybrid Encryption from Weakened Key Encapsulation.
Dennis Hofheinz, Eike Kiltz
2007Secure Identification and QKD in the Bounded-Quantum-Storage Model.
Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
2007Security-Amplifying Combiners for Collision-Resistant Hash Functions.
Marc Fischlin, Anja Lehmann
2007Simulatable VRFs with Applications to Multi-theorem NIZK.
Melissa Chase, Anna Lysyanskaya
2007Universally-Composable Two-Party Computation in Two Rounds.
Omer Horvitz, Jonathan Katz