CRYPTO A*

39 papers

YearTitle / Authors
2010A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
Orr Dunkelman, Nathan Keller, Adi Shamir
2010A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010Additively Homomorphic Encryption with
Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
2010Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings
Tal Rabin
2010An Efficient and Parallel Gaussian Sampler for Lattices.
Chris Peikert
2010Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back).
Zvika Brakerski, Shafi Goldwasser
2010Concurrent Non-Malleable Zero Knowledge Proofs.
Huijia Lin, Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
2010Correcting Errors in RSA Private Keys.
Wilko Henecka, Alexander May, Alexander Meurer
2010Credential Authenticated Identification and Key Exchange.
Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
2010Cryptographic Extraction and Key Derivation: The HKDF Scheme.
Hugo Krawczyk
2010Efficient Chosen-Ciphertext Security via Extractable Hash Proofs.
Hoeteck Wee
2010Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.
Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
2010Equivalence of Uniform Key Agreement and Composition Insecurity.
Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky
2010Factorization of a 768-Bit RSA Modulus.
Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, Paul Zimmermann
2010Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
Tatsuaki Okamoto, Katsuyuki Takashima
2010Improved Delegation of Computation Using Fully Homomorphic Encryption.
Kai-Min Chung, Yael Tauman Kalai, Salil P. Vadhan
2010Improved Differential Attacks for ECHO and Grøstl.
Thomas Peyrin
2010Instantiability of RSA-OAEP under Chosen-Plaintext Attack.
Eike Kiltz, Adam O'Neill, Adam D. Smith
2010Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
2010Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.
Shweta Agrawal, Dan Boneh, Xavier Boyen
2010Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.
Yevgeniy Dodis, Krzysztof Pietrzak
2010Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.
Ivan Damgård, Claudio Orlandi
2010Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
Rosario Gennaro, Craig Gentry, Bryan Parno
2010Oblivious RAM Revisited.
Benny Pinkas, Tzachy Reinman
2010On Generalized Feistel Networks.
Viet Tung Hoang, Phillip Rogaway
2010On Strong Simulation and Composable Point Obfuscation.
Nir Bitansky, Ran Canetti
2010On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.
Severin Winkler, Jürg Wullschleger
2010Password-Authenticated Session-Key Generation on the Internet in the Plain Model.
Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
2010Protecting Cryptographic Keys against Continual Leakage.
Ali Juma, Yevgeniy Vahlis
2010Protocols for Multiparty Coin Toss with Dishonest Majority.
Amos Beimel, Eran Omri, Ilan Orlov
2010Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.
Mihir Bellare, David Cash
2010Sampling in a Quantum Population, and Applications.
Niek J. Bouman, Serge Fehr
2010Secure Multiparty Computation with Minimal Interaction.
Yuval Ishai, Eyal Kushilevitz, Anat Paskin
2010Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.
Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
2010Securing Computation against Continuous Leakage.
Shafi Goldwasser, Guy N. Rothblum
2010Structure-Preserving Signatures and Commitments to Group Elements.
Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
2010Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.
Anindya De, Luca Trevisan, Madhur Tulsiani
2010Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.
Craig Gentry
2010Universally Composable Incoercibility.
Dominique Unruh, Jörn Müller-Quade