EUROCRYPT A*

32 papers

YearTitle / Authors
2008A New Mode of Operation for Block Ciphers and Length-Preserving MACs.
Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya
2008A Practical Attack on KeeLoq.
Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel
2008Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings
Nigel P. Smart
2008Almost-Everywhere Secure Computation.
Juan A. Garay, Rafail Ostrovsky
2008Collisions for the LPS Expander Graph Hash Function.
Jean-Pierre Tillich, Gilles Zémor
2008David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware.
Tal Moran, Gil Segev
2008Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs
2008Efficient Non-interactive Proof Systems for Bilinear Groups.
Jens Groth, Amit Sahai
2008Efficient Sequential Aggregate Signed Data.
Gregory Neven
2008Efficient Two Party and Multi Party Computation Against Covert Adversaries.
Vipul Goyal, Payman Mohassel, Adam D. Smith
2008HB
Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin
2008Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves.
Benjamin A. Smith
2008Isolated Proofs of Knowledge and Isolated Zero Knowledge.
Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs
2008Key Recovery on Hidden Monomial Multivariate Schemes.
Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern
2008New Constructions for UC Secure Computation Using Tamper-Proof Hardware.
Nishanth Chandran, Vipul Goyal, Amit Sahai
2008New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Lei Wang, Kazuo Ohta, Noboru Kunihiro
2008Obfuscating Point Functions with Multibit Output.
Ran Canetti, Ronny Ramzi Dakdouk
2008On the Indifferentiability of the Sponge Construction.
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2008Precise Concurrent Zero Knowledge.
Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
2008Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Jonathan Katz, Amit Sahai, Brent Waters
2008Predicting Lattice Reduction.
Nicolas Gama, Phong Q. Nguyen
2008Protocols and Lower Bounds for Failure Localization in the Internet.
Boaz Barak, Sharon Goldberg, David Xiao
2008Proving Tight Security for Rabin-Williams Signatures.
Daniel J. Bernstein
2008Second Preimage Attacks on Dithered Hash Functions.
Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer
2008Security/Efficiency Tradeoffs for Permutation-Based Hashing.
Phillip Rogaway, John P. Steinberger
2008Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves.
Hao Chen, Ronald Cramer, Robbert de Haan, Ignacio Cascudo Pueyo
2008Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle.
Jens Groth, Yuval Ishai
2008The Twin Diffie-Hellman Problem and Applications.
David Cash, Eike Kiltz, Victor Shoup
2008Threshold RSA for Dynamic and Ad-Hoc Groups.
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
2008Towards Key-Dependent Message Security in the Standard Model.
Dennis Hofheinz, Dominique Unruh
2008Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme.
Kaoru Kurosawa, Kazuhiro Suzuki
2008Zero-Knowledge Sets with Short Proofs.
Dario Catalano, Dario Fiore, Mariagrazia Messina