|  | 
 List of Accepted Papers
Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens and Arjen Lenstra and Benne de Weger
 
 
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist Krzysztof Pietrzak
 
 
The collision intractability of MDC-2 in the ideal-cipher model John P. Steinberger
 
 
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Yehuda Lindell and Benny Pinkas
 
 
Revisiting the Efficiency of Malicious Two-Party Computation David P. Woodruff
 
 
Efficient Two-Party Secure Computation on Committed Inputs Stanislaw Jarecki and Vitaly Shmatikov
 
 
Cryptanalysis of the Sidelnikov cryptosystem Lorenz Minder
 
 
Toward a rigorous variation of Coppersmith's algorithm on three variables Aurelie Bauer and Antoine Joux
 
 
An L(1/3 + epsilon) algorithm for the discrete logarithm problem in low degree curves Andreas Enge and Pierrick Gaudry
 
 
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility Chun-Yuan Hsiao and Chi-Jen Lu and Leonid Reyzin
 
 
Zero Knowledge and Soundness are Symmetric Shien Jin Ong and Salil Vadhan
 
 
Mesh Signatures Xavier Boyen
 
 
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks Thomas Ristenpart and Scott Yilek
 
 
How to Verify on the Road Jan Camenisch and Susan Hohenberger and Michael Ostergaard Pedersen
 
 
Cryptanalysis of SFLASH with Slightly Modified Parameters Vivien Dubois and Pierre-Alain Fouque and Jacques Stern
 
 
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Hongjun Wu and Bart Preneel
 
 
Secure Computation from Random Error Correcting Codes Hao Chen and Ronald Cramer and Shafi Goldwasser and Robbert de Haan and Vinod Vaikuntanathan
 
 
Round-Efficient Secure Computation in Point-to-Point Networks Jonathan Katz and Chiu-Yuen Koo
 
 
Atomic Secure Multi-Party Multiplication with Low Communication Ronald Cramer and Ivan Damgaard and Robbert de Haan
 
 
Universally Composable Secure Computation Using Tamper-Proof Hardware Jonathan Katz
 
 
Generic and Practical Resettable Zero-Knowledge in the Bare Public-key Model Moti Yung and Yunlei Zhao
 
 
Instance-dependent Verifiable Random Functions and Their Application to Simultaneous Resettability Yi Deng and Dongdai Lin
 
 
General Ad Hoc Encryption from Exponent Inversion IBE Xavier Boyen
 
 
Non-Interactive Proofs for Integer Multiplication Ivan Damgard and Rune Thorbek
 
 
Ate Pairing on Hyperelliptic Curves Robert Granger and Florian Hess and Roger Oyono and Nicolas Theriault and Frederik Vercauteren
 
 
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit Willi Geiselmann and Rainer Steinwandt
 
 
Ideal Multipartite Secret Sharing Schemes Oriol Farras and Jaume Marti-Farre and Carles Padro
 
 
Divisible e-cash systems can be truly anonymous Sebastien Canard and Aline Gouget
 
 
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security Ueli Maurer and Johan Sjodin
 
 
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly Krzysztof Pietrzak and Johan Sjodin
 
 
Feistel Networks made Public, and Applications Yevgeniy Dodis and Prashant Puniya
 
 
Oblivious-Transfer Amplification Juerg Wullschleger
 
 
Adaptive Oblivious Transfer from Blind Signatures Jan Camenisch and Gregory Neven and abhi shelat
 
 
 |  |