EUROCRYPT A*

34 papers

YearTitle / Authors
2007A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security.
Ueli M. Maurer, Johan Sjödin
2007Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings
Moni Naor
2007An
Andreas Enge, Pierrick Gaudry
2007An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.
Yehuda Lindell, Benny Pinkas
2007Ate Pairing on Hyperelliptic Curves.
Robert Granger, Florian Hess, Roger Oyono, Nicolas Thériault, Frederik Vercauteren
2007Atomic Secure Multi-party Multiplication with Low Communication.
Ronald Cramer, Ivan Damgård, Robbert de Haan
2007Batch Verification of Short Signatures.
Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen
2007Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities.
Marc Stevens, Arjen K. Lenstra, Benne de Weger
2007Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility.
Chun-Yuan Hsiao, Chi-Jen Lu, Leonid Reyzin
2007Cryptanalysis of SFLASH with Slightly Modified Parameters.
Vivien Dubois, Pierre-Alain Fouque, Jacques Stern
2007Cryptanalysis of the Sidelnikov Cryptosystem.
Lorenz Minder, Amin Shokrollahi
2007Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy.
Hongjun Wu, Bart Preneel
2007Divisible E-Cash Systems Can Be Truly Anonymous.
Sébastien Canard, Aline Gouget
2007Efficient Two-Party Secure Computation on Committed Inputs.
Stanislaw Jarecki, Vitaly Shmatikov
2007Feistel Networks Made Public, and Applications.
Yevgeniy Dodis, Prashant Puniya
2007General
Xavier Boyen
2007Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model.
Moti Yung, Yunlei Zhao
2007Ideal Multipartite Secret Sharing Schemes.
Oriol Farràs, Jaume Martí-Farré, Carles Padró
2007Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability.
Yi Deng, Dongdai Lin
2007Mesh Signatures.
Xavier Boyen
2007Non-interactive Proofs for Integer Multiplication.
Ivan Damgård, Rune Thorbek
2007Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist.
Krzysztof Pietrzak
2007Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit.
Willi Geiselmann, Rainer Steinwandt
2007Oblivious-Transfer Amplification.
Jürg Wullschleger
2007Range Extension for Weak PRFs; The Good, the Bad, and the Ugly.
Krzysztof Pietrzak, Johan Sjödin
2007Revisiting the Efficiency of Malicious Two-Party Computation.
David P. Woodruff
2007Round-Efficient Secure Computation in Point-to-Point Networks.
Jonathan Katz, Chiu-Yuen Koo
2007Secure Computation from Random Error Correcting Codes.
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan
2007Simulatable Adaptive Oblivious Transfer.
Jan Camenisch, Gregory Neven, Abhi Shelat
2007The Collision Intractability of MDC-2 in the Ideal-Cipher Model.
John P. Steinberger
2007The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
Thomas Ristenpart, Scott Yilek
2007Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables.
Aurélie Bauer, Antoine Joux
2007Universally Composable Multi-party Computation Using Tamper-Proof Hardware.
Jonathan Katz
2007Zero Knowledge and Soundness Are Symmetric.
Shien Jin Ong, Salil P. Vadhan