K. Srinathan and Arvind Narayanan and C. Pandu Ranga (Indian Institute of
Technology Madras)
Faster Correlation Attack on Bluetooth E0 Keystream Generator,
Yi Lu and Serge Vaudenay (EPFL)
Pseudo-signatures, broadcast, and multi-party computation from correlated
randomness,
Matthias Fitzi (U. C. Davis), Stefan Wolf and Juerg Wullschleger
(Univ. Montreal)
Asymptotically Optimal Communication for Torus-Based Cryptography,
Marten van Dijk (MIT / Philips Research), David Woodruff (MIT)
Secure Identity Based Encryption Without Random Oracles,
Dan Boneh (Stanford Univ.), Xavier Boyen (Voltage Security)
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge
Protocols,
Mihir Bellare and Adriana Palacio (U. C. San Diego)
A New Paradigm of Hybrid Encryption Scheme,
Kaoru Kurosawa (Ibaraki Univ.), Yvo Desmedt (Florida State Univ.)
Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to
Factoring,
Alexander May (Paderborn Univ.)
Round-Optimal Secure Two-Party Computation,
Jonathan Katz (Univ. Maryland), Rafail Ostrovsky (UCLA)
Near-Collisions of SHA-0,
Eli Biham and Rafi Chen (Technion)
An Improved Correlation Attack Against Irregular Clocked and Filtered
Keystream Generators,
Håvard Molland and Tor Helleseth (Univ. Bergen)
How to Compress Rabin Ciphertexts and Signatures (and More),
Craig Gentry (DoCoMo USA Labs)
Multi-trapdoor Commitments and their Applications to Proofs of Knowledge
Secure under Concurrent Man-in-the-middle
Attacks,
Rosario Gennaro (IBM T.J.Watson Research Center)
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC
Modes,
Rosario Gennaro (IBM T.J.Watson Research Center), Johan Hastad (Royal
Institute of Technology), Hugo Krawczyk (Technion &
IBM T.J.Watson Research Center) Tal Rabin (IBM T.J.Watson Research Center)
Privacy-Preserving Datamining on Vertically Partitioned Databases
Cynthia Dwork and Kobbi Nissim ( Microsoft Research).
Security of Random Feistel Schemes with 5 or more rounds