EUROCRYPT A*

36 papers

YearTitle / Authors
2006A Provable-Security Treatment of the Key-Wrap Problem.
Phillip Rogaway, Thomas Shrimpton
2006Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings
Serge Vaudenay
2006Alien
Vanessa Gratzer, David Naccache
2006Compact Group Signatures Without Random Oracles.
Xavier Boyen, Brent Waters
2006Composition Implies Adaptive Security in Minicrypt.
Krzysztof Pietrzak
2006Cryptography in Theory and Practice: The Case of Encryption in IPsec.
Kenneth G. Paterson, Arnold K. L. Yau
2006Efficient Binary Conversion for Paillier Encrypted Values.
Berry Schoenmakers, Pim Tuyls
2006Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli, Willi Meier, Olivier Ruatta
2006Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys.
Dan Boneh, Amit Sahai, Brent Waters
2006Herding Hash Functions and the Nostradamus Attack.
John Kelsey, Tadayoshi Kohno
2006Hiding Secret Points Amidst Chaff.
Ee-Chien Chang, Qiming Li
2006How to Strengthen Pseudo-random Generators by Using Compression.
Aline Gouget, Hervé Sibert
2006Information-Theoretic Conditions for Two-Party Secure Function Evaluation.
Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
2006Language Modeling and Encryption on Packet Switched Networks.
Kevin S. McCurley
2006Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures.
Phong Q. Nguyen, Oded Regev
2006Luby-Rackoff Ciphers from Weak Round Functions?
Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin
2006Oblivious Transfer Is Symmetric.
Stefan Wolf, Jürg Wullschleger
2006On the (Im-)Possibility of Extending Coin Toss.
Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
2006Optimal Reductions Between Oblivious Transfers Using Interactive Hashing.
Claude Crépeau, George Savvides
2006Our Data, Ourselves: Privacy Via Distributed Noise Generation.
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor
2006Parallel and Concurrent Security of the HB and HB
Jonathan Katz, Ji Sun Shin
2006Perfect Non-interactive Zero Knowledge for NP.
Jens Groth, Rafail Ostrovsky, Amit Sahai
2006Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol.
Tal Moran, Moni Naor
2006Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects.
Jean-Charles Faugère, Ludovic Perret
2006Practical Identity-Based Encryption Without Random Oracles.
Craig Gentry
2006Private Circuits II: Keeping Secrets in Tamperable Circuits.
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David A. Wagner
2006QUAD: A Practical Stream Cipher with Provable Security.
Côme Berbain, Henri Gilbert, Jacques Patarin
2006Security Analysis of the Strong Diffie-Hellman Problem.
Jung Hee Cheon
2006Sequential Aggregate Signatures and Multisignatures Without Random Oracles.
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
2006Simplified Threshold RSA with Adaptive and Proactive Security.
Jesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen
2006Symplectic Lattice Reduction and NTRU.
Nicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen
2006The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model.
Alexander W. Dent
2006The Function Field Sieve in the Medium Prime Case.
Antoine Joux, Reynald Lercier
2006The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs.
Mihir Bellare, Phillip Rogaway
2006Unclonable Group Identification.
Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen
2006VSH, an Efficient and Provable Collision-Resistant Hash Function.
Scott Contini, Arjen K. Lenstra, Ron Steinfeld