EUROCRYPT A*

40 papers

YearTitle / Authors
2003A Forward-Secure Public-Key Encryption Scheme.
Ran Canetti, Shai Halevi, Jonathan Katz
2003A Framework for Password-Based Authenticated Key Exchange.
Rosario Gennaro, Yehuda Lindell
2003A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem.
Daniel Augot, Matthieu Finiasz
2003A Signature Scheme as Secure as the Diffie-Hellman Problem.
Eu-Jin Goh, Stanislaw Jarecki
2003A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions.
Yehuda Lindell
2003A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications.
Mihir Bellare, Tadayoshi Kohno
2003A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
Alex Biryukov, Christophe De Cannière, An Braeken, Bart Preneel
2003Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings
Eli Biham
2003Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
2003Algebraic Attacks on Stream Ciphers with Linear Feedback.
Nicolas T. Courtois, Willi Meier
2003CAPTCHA: Using Hard AI Problems for Security.
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford
2003Certificate-Based Encryption and the Certificate Revocation Problem.
Craig Gentry
2003Concealment and Its Applications to Authenticated Encryption.
Yevgeniy Dodis, Jee Hea An
2003Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time.
Reynald Lercier, David Lubicz
2003Cryptanalysis of the EMD Mode of Operation.
Antoine Joux
2003Cryptanalysis of the Public-Key Encryption Based on Braid Groups.
Eonkyung Lee, Je Hong Park
2003Efficient Multi-party Computation over Rings.
Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz
2003Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications.
Jonathan Katz
2003Extracting Group Signatures from Traitor Tracing Schemes.
Aggelos Kiayias, Moti Yung
2003Facts and Myths of Enigma: Breaking Stereotypes.
Kris Gaj, Arkadiusz Orlowski
2003Fair Secure Two-Party Computation.
Benny Pinkas
2003Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.
Mihir Bellare, Daniele Micciancio, Bogdan Warinschi
2003Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures.
Michael Szydlo
2003Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms.
Mathieu Ciet, Tanja Lange, Francesco Sica, Jean-Jacques Quisquater
2003Nearly One-Sided Tests and the Goldreich-Levin Predicate.
Gustav Hast
2003New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction.
Renato Renner, Stefan Wolf
2003On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions.
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
2003On the Optimality of Linear, Differential, and Sequential Distinguishers.
Pascal Junod
2003On the Security of RDSA.
Pierre-Alain Fouque, Guillaume Poupard
2003Predicting the Shrinking Generator with Fixed Connections.
Patrik Ekdahl, Willi Meier, Thomas Johansson
2003Provably Secure Threshold Password-Authenticated Key Exchange.
Mario Di Raimondo, Rosario Gennaro
2003Resettable Zero-Knowledge in the Weak Public-Key Model.
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
2003Round Efficiency of Multi-party Computation with a Dishonest Majority.
Jonathan Katz, Rafail Ostrovsky, Adam D. Smith
2003Simulatable Commitments and Efficient Concurrent Zero-Knowledge.
Daniele Micciancio, Erez Petrank
2003Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition.
Rafael Pass
2003Strengthening Zero-Knowledge Protocols Using Signatures.
Juan A. Garay, Philip D. MacKenzie, Ke Yang
2003The GHS Attack Revisited.
Florian Hess
2003The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations.
Ueli M. Maurer, Krzysztof Pietrzak
2003Two-Threshold Broadcast and Detectable Multi-party Computation.
Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger
2003Why Provable Security Matters?
Jacques Stern