EUROCRYPT A*

34 papers

YearTitle / Authors
20053-Move Undeniable Signature Scheme.
Kaoru Kurosawa, Swee-Huay Heng
2005A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem.
Ludovic Perret
2005A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers.
Johannes Blömer, Alexander May
2005Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings
Ronald Cramer
2005Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes.
Claude Crépeau, Daniel Gottesman, Adam D. Smith
2005Collisions of SHA-0 and Reduced SHA-1.
Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby
2005Compact E-Cash.
Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
2005Computational Indistinguishability Between Quantum States and Its Cryptographic Application.
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
2005Cryptanalysis of the Hash Functions MD4 and RIPEMD.
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu
2005Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract).
Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek
2005Differential Cryptanalysis for Multivariate Schemes.
Pierre-Alain Fouque, Louis Granboulan, Jacques Stern
2005Efficient Identity-Based Encryption Without Random Oracles.
Brent Waters
2005Floating-Point LLL Revisited.
Phong Q. Nguyen, Damien Stehlé
2005Fuzzy Identity-Based Encryption.
Amit Sahai, Brent Waters
2005Group Signatures with Efficient Concurrent Join.
Aggelos Kiayias, Moti Yung
2005Hierarchical Identity Based Encryption with Constant Size Ciphertext.
Dan Boneh, Xavier Boyen, Eu-Jin Goh
2005How to Break MD5 and Other Hash Functions.
Xiaoyun Wang, Hongbo Yu
2005Mercurial Commitments with Applications to Zero-Knowledge Sets.
Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin
2005On Robust Combiners for Oblivious Transfer and Other Primitives.
Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen
2005On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.
John Black, Martin Cochran, Thomas Shrimpton
2005One-Way Chain Based Broadcast Encryption Schemes.
Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo
2005Partial Key Exposure Attacks on RSA up to Full Size Exponents.
Matthias Ernst, Ellen Jochemsz, Alexander May, Benne de Weger
2005Practical Cryptography in High Dimensional Tori.
Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff
2005Predicting and Distinguishing Attacks on RC4 Keystream Generator.
Itsik Mantin
2005Public Traceability in Traitor Tracing Schemes.
Hervé Chabanne, Duong Hieu Phan, David Pointcheval
2005Reducing Complexity Assumptions for Statistically-Hiding Commitment.
Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel
2005Related-Key Boomerang and Rectangle Attacks.
Eli Biham, Orr Dunkelman, Nathan Keller
2005Second Preimages on n-Bit Hash Functions for Much Less than 2
John Kelsey, Bruce Schneier
2005Secure Remote Authentication Using Biometric Data.
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam D. Smith
2005Smooth Projective Hashing and Two-Message Oblivious Transfer.
Yael Tauman Kalai
2005Stronger Security Bounds for Wegman-Carter-Shoup Authenticators.
Daniel J. Bernstein
2005Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup
2005The RSA Group is Pseudo-Free.
Daniele Micciancio
2005Universally Composable Password-Based Key Exchange.
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie