|
List of Accepted Papers
- Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Marc Stevens and Arjen Lenstra and Benne de Weger
- Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist
Krzysztof Pietrzak
- The collision intractability of MDC-2 in the ideal-cipher model
John P. Steinberger
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Yehuda Lindell and Benny Pinkas
- Revisiting the Efficiency of Malicious Two-Party Computation
David P. Woodruff
- Efficient Two-Party Secure Computation on Committed Inputs
Stanislaw Jarecki and Vitaly Shmatikov
- Cryptanalysis of the Sidelnikov cryptosystem
Lorenz Minder
- Toward a rigorous variation of Coppersmith's algorithm on three variables
Aurelie Bauer and Antoine Joux
- An L(1/3 + epsilon) algorithm for the discrete logarithm problem in low degree curves
Andreas Enge and Pierrick Gaudry
- Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility
Chun-Yuan Hsiao and Chi-Jen Lu and Leonid Reyzin
- Zero Knowledge and Soundness are Symmetric
Shien Jin Ong and Salil Vadhan
- Mesh Signatures
Xavier Boyen
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Thomas Ristenpart and Scott Yilek
- How to Verify on the Road
Jan Camenisch and Susan Hohenberger and Michael Ostergaard Pedersen
- Cryptanalysis of SFLASH with Slightly Modified Parameters
Vivien Dubois and Pierre-Alain Fouque and Jacques Stern
- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
Hongjun Wu and Bart Preneel
- Secure Computation from Random Error Correcting Codes
Hao Chen and Ronald Cramer and Shafi Goldwasser and Robbert de Haan and Vinod Vaikuntanathan
- Round-Efficient Secure Computation in Point-to-Point Networks
Jonathan Katz and Chiu-Yuen Koo
- Atomic Secure Multi-Party Multiplication with Low Communication
Ronald Cramer and Ivan Damgaard and Robbert de Haan
- Universally Composable Secure Computation Using Tamper-Proof Hardware
Jonathan Katz
- Generic and Practical Resettable Zero-Knowledge in the Bare Public-key Model
Moti Yung and Yunlei Zhao
- Instance-dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
Yi Deng and Dongdai Lin
- General Ad Hoc Encryption from Exponent Inversion IBE
Xavier Boyen
- Non-Interactive Proofs for Integer Multiplication
Ivan Damgard and Rune Thorbek
- Ate Pairing on Hyperelliptic Curves
Robert Granger and Florian Hess and Roger Oyono and Nicolas Theriault and Frederik Vercauteren
- Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
Willi Geiselmann and Rainer Steinwandt
- Ideal Multipartite Secret Sharing Schemes
Oriol Farras and Jaume Marti-Farre and Carles Padro
- Divisible e-cash systems can be truly anonymous
Sebastien Canard and Aline Gouget
- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
Ueli Maurer and Johan Sjodin
- Range Extension for Weak PRFs; The Good, the Bad, and the Ugly
Krzysztof Pietrzak and Johan Sjodin
- Feistel Networks made Public, and Applications
Yevgeniy Dodis and Prashant Puniya
- Oblivious-Transfer Amplification
Juerg Wullschleger
- Adaptive Oblivious Transfer from Blind Signatures
Jan Camenisch and Gregory Neven and abhi shelat
|
|