Proceedings of PKC 2006
Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings
, Springer
- New Attacks on RSA with Small Secret CRT-Exponents., Daniel Bleichenbacher, Alexander May, pp. 1-13
- PDF postscript BibTeX
- An Attack on a Modified Niederreiter Encryption Scheme., Christian Wieschebrink, pp. 14-26
- PDF postscript BibTeX
- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm., Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern, pp. 27-43
- PDF postscript BibTeX
- Efficient Polynomial Operations in the Shared-Coefficients Setting., Payman Mohassel, Matthew K. Franklin, pp. 44-57
- PDF postscript BibTeX
- Generic On-Line/Off-Line Threshold Signatures., Chris Crutchfield, David Molnar, David Turner, David Wagner, pp. 58-74
- PDF postscript BibTeX
- Linear Integer Secret Sharing and Distributed Exponentiation., Ivan Damgård, Rune Thorbek, pp. 75-90
- PDF postscript BibTeX
- Encoding-Free ElGamal Encryption Without Random Oracles., Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval, pp. 91-104
- PDF postscript BibTeX
- Parallel Key-Insulated Public Key Encryption., Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai, pp. 105-122
- PDF postscript BibTeX
- Provably Secure Steganography with Imperfect Sampling., Anna Lysyanskaya, Mira Meyerovich, pp. 123-139
- PDF postscript BibTeX
- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited., Ilya Mironov, pp. 140-156
- PDF postscript BibTeX
- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption., Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang, pp. 157-173
- PDF postscript BibTeX
- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve., An Commeine, Igor Semaev, pp. 174-190
- PDF postscript BibTeX
- Efficient Scalar Multiplication by Isogeny Decompositions., Christophe Doche, Thomas Icart, David R. Kohel, pp. 191-206
- PDF postscript BibTeX
- Curve25519: New Diffie-Hellman Speed Records., Daniel J. Bernstein, pp. 207-228
- PDF postscript BibTeX
- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman., Dan Boneh, Emily Shen, Brent Waters, pp. 229-240
- PDF postscript BibTeX
- Generalization of the Selective-ID Security Model for HIBE Protocols., Sanjit Chatterjee, Palash Sarkar, pp. 241-256
- PDF postscript BibTeX
- Identity-Based Aggregate Signatures., Craig Gentry, Zulfikar Ramzan, pp. 257-273
- postscript BibTeX
- On the Limitations of the Spread of an IBE-to-PKE Transformation., Eike Kiltz, pp. 274-289
- PDF postscript BibTeX
- Inoculating Multivariate Schemes Against Differential Attacks., Jintai Ding, Jason E. Gower, pp. 290-301
- PDF postscript BibTeX
- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol., Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov, pp. 302-314
- postscript BibTeX
- High-Order Attacks Against the Exponent Splitting Protection., Frédéric Muller, Frédéric Valette, pp. 315-329
- PDF postscript BibTeX
- New Online/Offline Signature Schemes Without Random Oracles., Kaoru Kurosawa, Katja Schmidt-Samoa, pp. 330-346
- PDF postscript BibTeX
- Anonymous Signature Schemes., Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang, pp. 347-363
- PDF postscript BibTeX
- The Power of Identification Schemes., Kaoru Kurosawa, Swee-Huay Heng, pp. 364-377
- PDF postscript BibTeX
- Security Analysis of KEA Authenticated Key Exchange Protocol., Kristin Lauter, Anton Mityagin, pp. 378-394
- PDF postscript BibTeX
- SAS-Based Authenticated Key Agreement., Sylvain Pasini, Serge Vaudenay, pp. 395-409
- postscript BibTeX
- The Twist-AUgmented Technique for Key Exchange., Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval, pp. 410-426
- PDF postscript BibTeX
- Password-Based Group Key Exchange in a Constant Number of Rounds., Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval, pp. 427-442
- PDF postscript BibTeX
- Conditional Oblivious Cast., Cheng-Kang Chu, Wen-Guey Tzeng, pp. 443-457
- BibTeX
- Efficiency Tradeoffs for Malicious Two-Party Computation., Payman Mohassel, Matthew K. Franklin, pp. 458-473
- PDF BibTeX
- On Constructing Certificateless Cryptosystems from Identity Based Encryption., Benoît Libert, Jean-Jacques Quisquater, pp. 474-490
- PDF postscript BibTeX
- Building Better Signcryption Schemes with Tag-KEMs., Tor E. Bjørstad, Alexander W. Dent, pp. 491-507
- PDF postscript BibTeX
- Security-Mediated Certificateless Cryptography., Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto, pp. 508-524
- PDF postscript BibTeX
- k-Times Anonymous Authentication with a Constant Proving Cost., Isamu Teranishi, Kazue Sako, pp. 525-542
- PDF postscript BibTeX
[ IACR home page ]
© IACR