IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of EUROCRYPT 2006

Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings , Springer
Security Analysis of the Strong Diffie-Hellman Problem., Jung Hee Cheon, pp. 1-11
 PDF  postscript BibTeX
Cryptography in Theory and Practice: The Case of Encryption in IPsec., Kenneth G. Paterson, Arnold K. L. Yau, pp. 12-29
 PDF  postscript BibTeX
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects., Jean-Charles Faugère, Ludovic Perret, pp. 30-47
 PDF  postscript BibTeX
Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt., Vanessa Gratzer, David Naccache, pp. 48-58
 postscript BibTeX
Hiding Secret Points Amidst Chaff., Ee-Chien Chang, Qiming Li, pp. 59-72
 PDF  postscript BibTeX
Parallel and Concurrent Security of the HB and HB+ Protocols., Jonathan Katz, Ji Sun Shin, pp. 73-87
 PDF  postscript BibTeX
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol., Tal Moran, Moni Naor, pp. 88-108
 PDF  postscript BibTeX
QUAD: A Practical Stream Cipher with Provable Security., Côme Berbain, Henri Gilbert, Jacques Patarin, pp. 109-128
 PDF  postscript BibTeX
How to Strengthen Pseudo-random Generators by Using Compression., Aline Gouget, Hervé Sibert, pp. 129-146
 PDF  postscript BibTeX
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks., Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta, pp. 147-164
 PDF  postscript BibTeX
VSH, an Efficient and Provable Collision-Resistant Hash Function., Scott Contini, Arjen K. Lenstra, Ron Steinfeld, pp. 165-182
 PDF  postscript BibTeX
Herding Hash Functions and the Nostradamus Attack., John Kelsey, Tadayoshi Kohno, pp. 183-200
 PDF  postscript BibTeX
Optimal Reductions Between Oblivious Transfers Using Interactive Hashing., Claude Crépeau, George Savvides, pp. 201-221
 PDF  postscript BibTeX
Oblivious Transfer Is Symmetric., Stefan Wolf, Jürg Wullschleger, pp. 222-232
 PDF  postscript BibTeX
Symplectic Lattice Reduction and NTRU., Nicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen, pp. 233-253
 PDF  postscript BibTeX
The Function Field Sieve in the Medium Prime Case., Antoine Joux, Reynald Lercier, pp. 254-270
 PDF  postscript BibTeX
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures., Phong Q. Nguyen, Oded Regev, pp. 271-288
 PDF BibTeX
The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model., Alexander W. Dent, pp. 289-307
 PDF  postscript BibTeX
Private Circuits II: Keeping Secrets in Tamperable Circuits., Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner, pp. 308-327
 PDF  postscript BibTeX
Composition Implies Adaptive Security in Minicrypt., Krzysztof Pietrzak, pp. 328-338
 PDF  postscript BibTeX
Perfect Non-interactive Zero Knowledge for NP., Jens Groth, Rafail Ostrovsky, Amit Sahai, pp. 339-358
 PDF  postscript BibTeX
Language Modeling and Encryption on Packet Switched Networks., Kevin S. McCurley, pp. 359-372
 PDF  postscript BibTeX
A Provable-Security Treatment of the Key-Wrap Problem., Phillip Rogaway, Thomas Shrimpton, pp. 373-390
 PDF  postscript BibTeX
Luby-Rackoff Ciphers from Weak Round Functions?, Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin, pp. 391-408
 PDF  postscript BibTeX
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs., Mihir Bellare, Phillip Rogaway, pp. 409-426
 PDF  postscript BibTeX
Compact Group Signatures Without Random Oracles., Xavier Boyen, Brent Waters, pp. 427-444
 PDF  postscript BibTeX
Practical Identity-Based Encryption Without Random Oracles., Craig Gentry, pp. 445-464
 PDF  postscript BibTeX
Sequential Aggregate Signatures and Multisignatures Without Random Oracles., Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters, pp. 465-485
 PDF  postscript BibTeX
Our Data, Ourselves: Privacy Via Distributed Noise Generation., Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor, pp. 486-503
 PDF  postscript BibTeX
On the (Im-)Possibility of Extending Coin Toss., Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh, pp. 504-521
 PDF  postscript BibTeX
Efficient Binary Conversion for Paillier Encrypted Values., Berry Schoenmakers, Pim Tuyls, pp. 522-537
 PDF  postscript BibTeX
Information-Theoretic Conditions for Two-Party Secure Function Evaluation., Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger, pp. 538-554
 PDF  postscript BibTeX
Unclonable Group Identification., Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen, pp. 555-572
 PDF  postscript BibTeX
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys., Dan Boneh, Amit Sahai, Brent Waters, pp. 573-592
 PDF  postscript BibTeX
Simplified Threshold RSA with Adaptive and Proactive Security., Jesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen, pp. 593-611
 PDF  postscript BibTeX

[ IACR home page ] © IACR