EUROCRYPT A*

42 papers

YearTitle / Authors
2000A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme.
François Grieu
2000A Composition Theorem for Universal One-Way Hash Functions.
Victor Shoup
2000A NICE Cryptanalysis.
Éliane Jaulmes, Antoine Joux
2000Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures.
Stanislaw Jarecki, Anna Lysyanskaya
2000Advanced Slide Attacks.
Alex Biryukov, David A. Wagner
2000Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding
Bart Preneel
2000An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves.
Pierrick Gaudry
2000Analysis and Optimization of the TWINKLE Factoring Device.
Arjen K. Lenstra, Adi Shamir
2000Authenticated Key Exchange Secure against Dictionary Attacks.
Mihir Bellare, David Pointcheval, Phillip Rogaway
2000Colossus and the German Lorenz Cipher - Code Breaking in WW II.
Anthony E. Sale
2000Computing Inverses over a Shared Secret Modulus.
Dario Catalano, Rosario Gennaro, Shai Halevi
2000Confirmer Signature Schemes Secure against Adaptive Adversaries.
Jan Camenisch, Markus Michels
2000Construction of Nonlinear Boolean Functions with Important Cryptographic Properties.
Palash Sarkar, Subhamoy Maitra
2000Cox-Rower Architecture for Fast Parallel Montgomery Multiplication.
Shin-ichi Kawamura, Masanobu Koike, Fumihiko Sano, Atsushi Shimbo
2000Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1.
Marc Girault, Jean-François Misarsky
2000Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R).
Eli Biham
2000Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations.
Nicolas T. Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir
2000Efficient Concurrent Zero-Knowledge in the Auxiliary String Model.
Ivan Damgård
2000Efficient Proofs that a Committed Number Lies in an Interval.
Fabrice Boudot
2000Efficient Receipt-Free Voting Based on Homomorphic Encryption.
Martin Hirt, Kazue Sako
2000Exposure-Resilient Functions and All-or-Nothing Transforms.
Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai
2000Factorization of a 512-Bit RSA Modulus.
Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman J. J. te Riele, Karen I. Aardal, Jeff Gilchrist, Gérard Guillerm, Paul C. Leyland, Joël Marchand, François Morain, Alec Muffett, Chris Putnam, Craig Putnam, Paul Zimmermann
2000Fair Encryption of RSA Keys.
Guillaume Poupard, Jacques Stern
2000General Secure Multi-party Computation from any Linear Secret-Sharing Scheme.
Ronald Cramer, Ivan Damgård, Ueli M. Maurer
2000How to Break a Practical MIX and Design a New One.
Yvo Desmedt, Kaoru Kurosawa
2000Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5.
Anne Canteaut, Michaël Trabbia
2000Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free.
Ueli M. Maurer, Stefan Wolf
2000Minimal-Latency Secure Function Evaluation.
Donald Beaver
2000New Attacks on PKCS#1 v1.5 Encryption.
Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
2000Noisy Polynomial Interpolation and Noisy Chinese Remaindering.
Daniel Bleichenbacher, Phong Q. Nguyen
2000On the Security of 3GPP Networks.
Michael Walker
2000One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval.
Eyal Kushilevitz, Rafail Ostrovsky
2000Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation.
Paul Dumais, Dominic Mayers, Louis Salvail
2000Practical Threshold Signatures.
Victor Shoup
2000Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions.
Anne Canteaut, Claude Carlet, Pascale Charpin, Caroline Fontaine
2000Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman.
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
2000Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements.
Mihir Bellare, Alexandra Boldyreva, Silvio Micali
2000Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme.
Jean-Sébastien Coron, David Naccache
2000Security Aspects of Practical Quantum Cryptography.
Gilles Brassard, Norbert Lütkenhaus, Tal Mor, Barry C. Sanders
2000Single Database Private Information Retrieval Implies Oblivious Transfer.
Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky
2000The Sum of PRPs Is a Secure PRF.
Stefan Lucks
2000Using Hash Functions as a Hedge against Chosen Ciphertext Attack.
Victor Shoup