CRYPTO A*

40 papers

YearTitle / Authors
2009Abstraction in Cryptography.
Ueli M. Maurer
2009Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings
Shai Halevi
2009Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over
Ignacio Cascudo Pueyo, Hao Chen, Ronald Cramer, Chaoping Xing
2009Batch Binary Edwards.
Daniel J. Bernstein
2009Collusion-Free Multiparty Computation in the Mediated Model.
Joël Alwen, Jonathan Katz, Yehuda Lindell, Giuseppe Persiano, Abhi Shelat, Ivan Visconti
2009Computational Differential Privacy.
Ilya Mironov, Omkant Pandey, Omer Reingold, Salil P. Vadhan
2009Computational Indistinguishability Amplification: Tight Product Theorems for System Composition.
Ueli M. Maurer, Stefano Tessaro
2009Cryptanalysis of C2.
Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz
2009Distinguisher and Related-Key Attack on the Full AES-256.
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic
2009Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions.
Brent Waters
2009Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems.
Benny Applebaum, David Cash, Chris Peikert, Amit Sahai
2009How Risky Is the Random-Oracle Model?
Gaëtan Leurent, Phong Q. Nguyen
2009How to Encipher Messages on a Small Domain.
Ben Morris, Phillip Rogaway, Till Stegers
2009How to Hash into Elliptic Curves.
Thomas Icart
2009Improving the Security of Quantum Protocols via Commit-and-Open.
Ivan Damgård, Serge Fehr, Carolin Lunemann, Louis Salvail, Christian Schaffner
2009Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
2009Linear Algebra with Sub-linear Zero-Knowledge Arguments.
Jens Groth
2009Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1.
Kazumaro Aoki, Yu Sasaki
2009Merkle Puzzles Are Optimal - An
Boaz Barak, Mohammad Mahmoody-Ghidary
2009Message Authentication Codes from Unpredictable Block Ciphers.
Yevgeniy Dodis, John P. Steinberger
2009New Birthday Attacks on Some MACs Based on Block Ciphers.
Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang
2009On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem.
Vadim Lyubashevsky, Daniele Micciancio
2009On the Amortized Complexity of Zero-Knowledge Protocols.
Ronald Cramer, Ivan Damgård
2009On the Composition of Public-Coin Zero-Knowledge Protocols.
Rafael Pass, Wei-Lung Dustin Tseng, Douglas Wikström
2009Position Based Cryptography.
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
2009Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures.
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann
2009Privacy-Enhancing Auctions Using Rational Cryptography.
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
2009Private Mutual Authentication and Conditional Oblivious Transfer.
Stanislaw Jarecki, Xiaomin Liu
2009Probabilistically Checkable Arguments.
Yael Tauman Kalai, Ran Raz
2009Public-Key Cryptosystems Resilient to Key Leakage.
Moni Naor, Gil Segev
2009Randomizable Proofs and Delegatable Anonymous Credentials.
Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham
2009Reconstructing RSA Private Keys from Random Key Bits.
Nadia Heninger, Hovav Shacham
2009Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate.
Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger
2009Short and Stateless Signatures from the RSA Assumption.
Susan Hohenberger, Brent Waters
2009Smooth Projective Hashing for Conditionally Extractable Commitments.
Michel Abdalla, Céline Chevalier, David Pointcheval
2009Solving Hidden Number Problem with One Bit Oracle and Advice.
Adi Akavia
2009Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
2009The Group of Signed Quadratic Residues and Applications.
Dennis Hofheinz, Eike Kiltz
2009The Round Complexity of Verifiable Secret Sharing Revisited.
Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan
2009Utility Dependence in Correct and Fair Rational Secret Sharing.
Gilad Asharov, Yehuda Lindell