EUROCRYPT A*

35 papers

YearTitle / Authors
2009A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier.
Kan Yasuda
2009A Leakage-Resilient Mode of Operation.
Krzysztof Pietrzak
2009A New Randomness Extraction Paradigm for Hybrid Encryption.
Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
2009A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks.
Jan Camenisch, Nishanth Chandran, Victor Shoup
2009A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
François-Xavier Standaert, Tal Malkin, Moti Yung
2009Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts).
Craig Gentry, Brent Waters
2009Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings
Antoine Joux
2009Asymmetric Group Key Agreement.
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer
2009Breaking RSA Generically Is Equivalent to Factoring.
Divesh Aggarwal, Ueli M. Maurer
2009Cryptanalysis of MDC-2.
Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen
2009Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC.
Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan
2009Cryptography without (Hardly Any) Secrets ?
Shafi Goldwasser
2009Cube Attacks on Tweakable Black Box Polynomials.
Itai Dinur, Adi Shamir
2009Double-Base Number System for Multi-scalar Multiplications.
Christophe Doche, David R. Kohel, Francesco Sica
2009ECM on Graphics Cards.
Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
2009Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves.
Steven D. Galbraith, Xibin Lin, Michael Scott
2009Finding Preimages in Full MD5 Faster Than Exhaustive Search.
Yu Sasaki, Kazumaro Aoki
2009Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields.
Takakazu Satoh
2009Key Agreement from Close Secrets over Unsecured Channels.
Bhavana Kanukurthi, Leonid Reyzin
2009On Randomizing Hash Functions to Strengthen the Security of Digital Signatures.
Praveen Gauravaram, Lars R. Knudsen
2009On the Portability of Generalized Schnorr Proofs.
Jan Camenisch, Aggelos Kiayias, Moti Yung
2009On the Security Loss in Cryptographic Reductions.
Chi-Jen Lu
2009On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis.
Guilhem Castagnos, Fabien Laguillaumie
2009On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model.
Eike Kiltz, Krzysztof Pietrzak
2009Optimal Randomness Extraction from a Diffie-Hellman Element.
Céline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer
2009Order-Preserving Symmetric Encryption.
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill
2009Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening.
Mihir Bellare, Dennis Hofheinz, Scott Yilek
2009Practical Chosen Ciphertext Secure Encryption from Factoring.
Dennis Hofheinz, Eike Kiltz
2009Realizing Hash-and-Sign Signatures under Standard Assumptions.
Susan Hohenberger, Brent Waters
2009Resettably Secure Computation.
Vipul Goyal, Amit Sahai
2009Salvaging Merkle-Damgård for Practical Applications.
Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
2009Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme.
Mihir Bellare, Thomas Ristenpart
2009Smashing SQUASH-0.
Khaled Ouafi, Serge Vaudenay
2009Traitors Collaborating in Public: Pirates 2.0.
Olivier Billet, Duong Hieu Phan
2009Verifiable Random Functions from Identity-Based Key Encapsulation.
Michel Abdalla, Dario Catalano, Dario Fiore