List of Accepted Papers
On Generating the Initial Key in the Bounded Storage Model
Stefan Dziembowski and Ueli Maurer
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
Jean-Sébastien Coron
Public-Key Steganography
Luis von Ahn and Nicholas J. Hopper
Optimal Communication Complexity of Generic Multicast Key Distribution
Daniele Micciancio and Saurabh Panjwani
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Tal Malkin and Satoshi Obana and Moti Yung
On the Hardness of Information-Theoretic Multiparty Computation
Yuval Ishai and Eyal Kushilevitz
Efficient Private Matching and Set Intersection
Michael J. Freedman and Kobbi Nissim and Benny Pinkas
Dining Cryptographers Revisited
Philippe Golle and Ari Juels
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
Mihir Bellare and Alexandra Boldyreva and Adriana Palacio
Security Proofs for Identity-Based Identification and Signature Schemes
Mihir Bellare and Chanathip Namprempre and Gregory Neven
Construction of Secure Random Curves of Genus 2 over Prime Fields
Pierrick Gaudry and Éric Schost
Hash Function Balance and its Impact on Birthday Attacks
Mihir Bellare and Tadayoshi Kohno
Short Signatures Without Random Oracles
Dan Boneh and Xavier Boyen
Projective Coordinates Leak
David Naccache and Nigel P. Smart and Jacques Stern
Anonymous Identification in Ad-Hoc Groups
Yevgeniy Dodis and Aggelos Kiayias and Antonio Nicolosi and Victor Shoup
Merkle Tree Traversal in Log Space and Time
Michael Szydlo
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Leonid Reyzin and Adam Smith
Sequential Aggregate Signatures from Trapdoor Permutations
Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham
Secure Hashed Diffie-Hellman over Non-DDH Groups
Rosario Gennaro and Hugo Krawczyk and Tal Rabin
On Simulation-Sound Trapdoor Commitments
Philip MacKenzie and Ke Yang
Public-Key Encryption with Keyword Search
Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano
Concurrent Signatures
Liqun Chen and Caroline Kudla and Kenneth G. Paterson
Traceable Signatures
Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
Positive Results and Techniques for Obfuscation
Benjamin Lynn and Manoj Prabhakaran and Amit Sahai
The Exact Price for Unconditionally Secure Asymmetric Cryptography
Renato Renner and Stefan Wolf
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
Ivan Damgaard and Thomas Pedersen and Louis Salvail
Multi-Party Computation with Hybrid Security
Matthias Fitzi and Thomas Holenstein and Jürg Wullschleger
Algebraic Attacks and Decomposition of Boolean Functions
Willi Meier and Enes Pasalic and Claude Carlet
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
Dan Boneh and Xavier Boyen
Practical Large-scale Distributed Key Generation
John Canny and Stephen Sorkin
Chosen-Ciphertext Security from Identity-Based Encryption
Ran Canetti and Shai Halevi and Jonathan Katz
Secure Computation of the k'th-Ranked Element
Gagan Aggarwal and Nina Mishra and Benny Pinkas
Handcuffing Big Brother: An Abuse-Resilient Transaction Escrow Scheme
Stanislaw Jarecki and Vitaly Shmatikov
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
Phong Q. Nguyen
Black-Box Composition Does Not Imply Adaptive Security
Steven Myers
Immunizing Encryption Schemes from Decryption Errors
Cynthia Dwork and Moni Naor and Omer Reingold
|