CRYPTO A*

33 papers

YearTitle / Authors
2008A Framework for Efficient and Composable Oblivious Transfer.
Chris Peikert, Vinod Vaikuntanathan, Brent Waters
2008Adaptive One-Way Functions and Applications.
Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan
2008Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings
David A. Wagner
2008Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions.
Martijn Stam
2008Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys.
Dimitar Jetchev, Ramarathnam Venkatesan
2008Bug Attacks.
Eli Biham, Yaniv Carmeli, Adi Shamir
2008Circular-Secure Encryption from Decision Diffie-Hellman.
Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky
2008Collusion-Free Protocols in the Mediated Model.
Joël Alwen, Abhi Shelat, Ivan Visconti
2008Communication Complexity in Algebraic Two-Party Protocols.
Rafail Ostrovsky, William E. Skeith III
2008Compression from Collisions, or Why CRHF Combiners Have a Long Output.
Krzysztof Pietrzak
2008Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers.
Phillip Rogaway, John P. Steinberger
2008Cryptanalysis of MinRank.
Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret
2008Cryptanalysis of the GOST Hash Function.
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt
2008Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations.
Manoj Prabhakaran, Mike Rosulek
2008Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
2008Distributed Private Data Analysis: Simultaneously Solving How and What.
Amos Beimel, Kobbi Nissim, Eran Omri
2008Dynamic Threshold Public-Key Encryption.
Cécile Delerablée, David Pointcheval
2008Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs.
Yevgeniy Dodis, Victor Shoup, Shabsi Walfish
2008Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries.
Payman Mohassel, Enav Weinreb
2008Founding Cryptography on Oblivious Transfer - Efficiently.
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
2008Improved Bounds on Security Reductions for Discrete Log Based Signatures.
Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam
2008Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms.
Helena Handschuh, Bart Preneel
2008New Efficient Attacks on Statistical Disclosure Control Mechanisms.
Cynthia Dwork, Sergey Yekhanin
2008New State Recovery Attack on RC4.
Alexander Maximov, Dmitry Khovratovich
2008Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems.
Chris Peikert, Vinod Vaikuntanathan
2008On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
2008On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
2008One-Time Programs.
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum
2008Preimages for Reduced SHA-0 and SHA-1.
Christophe De Cannière, Christian Rechberger
2008Programmable Hash Functions and Their Applications.
Dennis Hofheinz, Eike Kiltz
2008Public-Key Locally-Decodable Codes.
Brett Hemenway, Rafail Ostrovsky
2008Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Ivan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam D. Smith
2008The Random Oracle Model and the Ideal Cipher Model Are Equivalent.
Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin