Title
|
Authors
|
Download
|
Opening
Ceremony
|
Chi Sung Laih
|
|
|
|
|
Session 1
|
|
|
Chosen-Ciphertext
Security without Redundancy
|
Duong Hieu
Phan, David Pointcheval |
|
Some
RSA-based Encryption Schemes with Tight Security Reduction |
Kaoru
Kurosawa, Tsuyoshi Takagi |
|
A Simple
Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and
its Applications |
Emmanuel
Bresson, Dario Catalano, David Pointcheval |
|
|
|
|
Session 2
|
|
|
Index
Calculus Attack for Hyperelliptic Curves of Small Genus |
Nicolas
Thériault |
|
Solving
low
degree polynomials |
Don
Coppersmith |
|
|
|
|
Session 3
|
|
|
Parallelizing
Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves |
Pradeep Kumar
Mishra, Palash Sarkar |
|
The AGM-X0(N)
Heegner point lifting algorithm and elliptic curve point counting |
David R.
Kohel |
|
|
|
|
Session 4
|
|
|
Key
Management Schemes for Stateless Receivers Based on Time Varying
Heterogeneous Logical Key Hierarchy |
Miodrag
J.
Mihaljević |
|
|
|
|
Session 5
|
|
|
New
Parallel Domain Extenders for UOWHF |
Wonil
Lee,
Donghoon Chang, Sangjin Lee, Soohak Sung, Mridul Nandi |
|
|
|
|
Invited Talk I
|
|
|
Cryptography:
State of the Science |
Adi Shamir |
|
|
|
|
Session 6
|
|
|
Almost
uniform density of power residues and the provable security of ESIGN |
Tatsuaki
Okamoto, Jacques Stern |
|
|
|
|
Session 7
|
|
|
Rotations
and Translations of Number Field Sieve Polynomials |
Jason E.
Gower |
|
|
|
|
Invited Talk II
|
|
|
The
Secret
and Beauty of Ancient Chinese Locks |
Hong-Sen
Yan |
|
|
|
|
Session 8
|
|
|
A
Traceable Block Cipher |
Olivier
Billet, Henri Gilbert |
|
A New
Attack Against Khazad |
Frédéric
Muller |
|
|
|
|
Session 10
|
|
|
On
Diophantine Complexity and Statistical Zero-Knowledge Arguments |
Helger
Lipmaa |
|
Verifiable
Homomorphic Oblivious Transfer and Private Equality Test |
Helger
Lipmaa |
|
|
|
|
Session 11
|
|
|
A Complete
and Explicit Security Reduction Algorithm for RSA-based Cryptosystems |
Kaoru
Kurosawa , Katja Schmidt-Samoa, Tsuyoshi Takagi |
|
The
Insecurity of Esign in Practical Implementations |
Pierre-Alain
Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard |
|