Accepted Papers

Note: Submission 107 and 162 will be merged.

012

Title

The XL-algorithm and a Conjecture from Commutative Algebra

Authors

Claus Diem

Affiliations

Institute for Experimental Mathematics, University of Essen, Germany

019

Title

Colluding Attacks to an Untraceable Fair Network Payment Protocol and Two Signature Exchange

Authors

Feng Bao

Affiliations

Institute for Infocomm Research

025

Title

Masking Based Domain Extenders for UOWHFs: Bounds and Constructions

Authors

Palash Sarkar

Affiliations

Indian Statistical Institute

044

Title

OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding

Authors

Duong Hieu Phan and David Pointcheval

Affiliations

ENS and CNRS-ENS

055

Title

Privacy in Non-Private Environments

Authors

M. Blaeser, A. Jakoby, M. Liskiewicz and B. Manthey

Affiliations

ETH Zuerich, University of Luebeck, University of Luebeck and University of Luebeck

056

Title

Time-Memory Trade-Off Attacks on Multiplications and $T$-functions

Authors

Joydip Mitra and Palash Sarkar

Affiliations

Management Development Institute and Indian Statistical Institute

058

Title

Generic Homomorphic Undeniable Signatures

Authors

Jean Monnerat and Serge Vaudenay

Affiliations

EPFL

060

Title

The MD2 Hash Function is Not One-Way

Authors

Frédéric Muller

Affiliations

DCSSI Crypto Lab

065

Title

How Far Can We Go Beyond Linear Cryptanalysis?

Authors

Thomas Baignères, Pascal Junod and Serge Vaudenay

Affiliations

EPFL

067

Title

Strong Conditional Oblivious Transfer and Computing on Intervals

Authors

Ian F. Blake and Vladimir Kolesnikov

Affiliations

Dept. Elec. and Comp. Eng, University of Toronto and Dept. Comp. Sci., University of Toronto

068

Title

Cryptanalysis of Bluetooth Keystream Generator Two-level E0

Authors

Yi Lu and Serge Vaudenay

Affiliations

EPFL

071

Title

Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC

Authors

Phillip Rogaway

Affiliations

University of California at Davis and Chiang Mai University

072

Title

New Approaches to Password Authenticated Key Exchange based on RSA

Authors

Muxiang Zhang

Affiliations

Verizon Laboratories

076

Title

Sieving Using Bucket Sort

Authors

Kazumaro Aoki and Hiroki Ueda

Affiliations

NTT and NTT

086

Title

Asynchronous Proactive Cryptosystems without Agreement

Authors

Bartosz Przydatek and Reto Strobl

Affiliations

ETHZ and IBM Research

088

Title

Right-Invariance: A Property for Probabilistic Analysis of Cryptography based on Infinite Groups

Authors

Eonkyung Lee

Affiliations

Sejong University, Korea

096

Title

On Feistel Ciphers using Optimal Diffusion Mappings across Multiple Rounds

Authors

Taizo Shirai and Bart Preneel

Affiliations

Sony Corporation and Katholieke Universiteit Leuven

101

Title

k-Times Anonymous Authentication

Authors

Isamu Teranisi, Jun Furukawa and Kazue Sako

Affiliations

NEC

105

Title

Improved Setup Assumptions for 3-round Resettable Zero Knowledge

Authors

Giovanni Di Crescenzo, Giuseppe Persiano and Ivan Visconti

Affiliations

Telcordia Technologies, Dipartimento di Informatica ed Appl. Universita' di Salerno and ENS

106

Title

On the Security of MOR Public Key Cryptosystem

Authors

In-sok Lee, Nam-seok Kwak, Woo-hwan Kim, Yoo-jin Baek and Sangil Nahm and Daesung Kwon

Affiliations

SNU, SNU, SNU, Samsung Co., Purdue Univ. and NSRI

107

Title

Comparison of XL and Groener basis algorithms over Finite Fields

Authors

Gwenole Ars and Jean-Charles Faugere

Affiliations

IRMAR, university of Rennes and CALFOR, LIP6, university of Paris 6

113

Title

The Davies-Murphy Power Attack

Authors

Sébastien Kunz-Jacques, Frédéric Muller and Frédéric Valette

Affiliations

DCSSI Crypto Lab, DCSSI Crypto Lab and DCSSI Crypto Lab

114

Title

Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices

Authors

Rosario Gennaro, Darren Leigh, Ravi Sundaram and William Yerazunis

Affiliations

IBM Research, Mitsubishi Research, Northeastern University and Mitsubishi Research

116

Title

Higher Order Universal One-Way Hash Functions

Authors

Deukjo Hong, Bart Preneel and Sangjin Lee

Affiliations

Korea University CIST, ESAT-COSIC Katholieke Universiteit Leuven and Korea University CIST

132

Title

On provably secure time-stamping schemes

Authors

Ahto Buldas and Märt Saarepera

Affiliations

Tartu University and Independent

144

Title

On the Generalized Linear Equivalence of Functions over Finite Fields

Authors

Luca Breveglieri, Alessandra Cherubini and Marco Macchetti

Affiliations

Politecnico di Milano, Politecnico di Milano and Politecnico di Milano

150

Title

Eliminating Random Permutation Oracles in the Even-Mansour Cipher

Authors

Craig Gentry and Zulfikar Ramzan

Affiliations

DoCoMo Communications Laboratory, USA

155

Title

Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice

Authors

Aggelos Kiayias and Moti Yung

Affiliations

University of Connecticut and Columbia University

162

Title

XL Algorithm and Groebner Bases Algorithms

Authors

Makoto Sugita, Mitsuru Kawazoe and Hideki Imai

Affiliations

Information-technology Promotion Agency (Japan), Osaka Prefecture University and University of Tokyo

165

Title

A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size against Self-Defensive Pirates

Authors

Tatsuyuki Matsushita and Hideki Imai

Affiliations

TOSHIBA Corporation and The University of Tokyo

179

Title

Secret Handshakes from CA-Oblivious Encryption

Authors

Claude Castelluccia, Stanislaw Jarecki and Gene Tsudik

Affiliations

UC Irvine

198

Title

Towards Plaintext-Aware Public-Key Encryption without Random Oracles

Authors

Mihir Bellare and Adriana Palacio

Affiliations

University of California, San Diego and University of California, San Diego

201

Title

Practical Two-Party Computation based on the Conditional Gate

Authors

Berry Schoenmakers and Pim Tuyls

Affiliations

TU Eindhoven and Philips Research Labs

205

Title

Constant-Round Authenticated Group Key Exchange for Dynamic Groups

Authors

Hyun Jeong Kim, Su Mi Lee and Dong Hoon Lee

Affiliations

Korea Univers, CIST

206

Title

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes

Authors

Ron Steinfeld, Huaxiong Wang and Josef Pieprzyk

Affiliations

Macquarie University, Macquarie University and Macquarie University

220

Title

Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings

Authors

Lan Nguyen and Rei Safavi-Naini

Affiliations

University of Wollongong and University of Wollongong