What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 2009
Year
Venue
Title
2009
CRYPTO
Abstraction in Cryptography
★
Invited paper
Ueli Maurer
2009
CRYPTO
Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings
Shai Halevi
2009
CRYPTO
Alice and Bob Go To Washington: A Cryptographic Theory of Politics and Policy
★
Invited talk
Edward W. Felten
2009
CRYPTO
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over <i>Any</i> Fixed Finite Field
Ignacio Cascudo
Hao Chen
Ronald Cramer
Chaoping Xing
2009
CRYPTO
Batch Binary Edwards
Daniel J. Bernstein
2009
CRYPTO
Collusion-Free Multiparty Computation in the Mediated Model
Joël Alwen
Jonathan Katz
Yehuda Lindell
Giuseppe Persiano
Abhi Shelat
Ivan Visconti
2009
CRYPTO
Computational Differential Privacy
Ilya Mironov
Omkant Pandey
Omer Reingold
Salil P. Vadhan
2009
CRYPTO
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
Ueli Maurer
Stefano Tessaro
2009
CRYPTO
Cryptanalysis of C2
Julia Borghoff
Lars R. Knudsen
Gregor Leander
Krystian Matusiewicz
2009
CRYPTO
Distinguisher and Related-Key Attack on the Full AES-256
Alex Biryukov
Dmitry Khovratovich
Ivica Nikolic
2009
CRYPTO
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
Brent Waters
2009
CRYPTO
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
Benny Applebaum
David Cash
Chris Peikert
Amit Sahai
2009
CRYPTO
How Risky Is the Random-Oracle Model?
Gaëtan Leurent
Phong Q. Nguyen
2009
CRYPTO
How to Encipher Messages on a Small Domain
Ben Morris
Phillip Rogaway
Till Stegers
2009
CRYPTO
How to Hash into Elliptic Curves
Thomas Icart
2009
CRYPTO
Improving the Security of Quantum Protocols via Commit-and-Open
Ivan Damgård
Serge Fehr
Carolin Lunemann
Louis Salvail
Christian Schaffner
2009
CRYPTO
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Joël Alwen
Yevgeniy Dodis
Daniel Wichs
2009
CRYPTO
Linear Algebra with Sub-linear Zero-Knowledge Arguments
Jens Groth
2009
CRYPTO
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Kazumaro Aoki
Yu Sasaki
2009
CRYPTO
Merkle Puzzles Are Optimal - An <i>O</i>(<i>n</i><sup>2</sup>)-Query Attack on Any Key Exchange from a Random Oracle
Boaz Barak
Mohammad Mahmoody-Ghidary
2009
CRYPTO
Message Authentication Codes from Unpredictable Block Ciphers
Yevgeniy Dodis
John P. Steinberger
2009
CRYPTO
New Birthday Attacks on Some MACs Based on Block Ciphers
Zheng Yuan
Wei Wang
Keting Jia
Guangwu Xu
Xiaoyun Wang
2009
CRYPTO
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem
Vadim Lyubashevsky
Daniele Micciancio
2009
CRYPTO
On the Amortized Complexity of Zero-Knowledge Protocols
Ronald Cramer
Ivan Damgård
2009
CRYPTO
On the Composition of Public-Coin Zero-Knowledge Protocols
Rafael Pass
Wei-Lung Dustin Tseng
Douglas Wikström
2009
CRYPTO
Position Based Cryptography
Nishanth Chandran
Vipul Goyal
Ryan Moriarty
Rafail Ostrovsky
2009
CRYPTO
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
Ralf-Philipp Weinmann
2009
CRYPTO
Privacy-Enhancing Auctions Using Rational Cryptography
Peter Bro Miltersen
Jesper Buus Nielsen
Nikos Triandopoulos
2009
CRYPTO
Private Mutual Authentication and Conditional Oblivious Transfer
Stanislaw Jarecki
Xiaomin Liu
2009
CRYPTO
Probabilistically Checkable Arguments
Yael Tauman Kalai
Ran Raz
2009
CRYPTO
Public-Key Cryptosystems Resilient to Key Leakage
Moni Naor
Gil Segev
2009
CRYPTO
Randomizable Proofs and Delegatable Anonymous Credentials
Mira Belenkiy
Jan Camenisch
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Hovav Shacham
2009
CRYPTO
Reconstructing RSA Private Keys from Random Key Bits
Nadia Heninger
Hovav Shacham
2009
CRYPTO
Short and Stateless Signatures from the RSA Assumption
Susan Hohenberger
Brent Waters
2009
CRYPTO
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
★
Best paper
Marc Stevens
Alexander Sotirov
Jacob Appelbaum
Arjen K. Lenstra
David Molnar
Dag Arne Osvik
Benne de Weger
2009
CRYPTO
Smooth Projective Hashing for Conditionally Extractable Commitments
Michel Abdalla
Céline Chevalier
David Pointcheval
2009
CRYPTO
Solving Hidden Number Problem with One Bit Oracle and Advice
Adi Akavia
2009
CRYPTO
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Juan A. Garay
Daniel Wichs
Hong-Sheng Zhou
2009
CRYPTO
The Group of Signed Quadratic Residues and Applications
Dennis Hofheinz
Eike Kiltz
2009
CRYPTO
The Round Complexity of Verifiable Secret Sharing Revisited
Arpita Patra
Ashish Choudhary
Tal Rabin
C. Pandu Rangan
2009
CRYPTO
Utility Dependence in Correct and Fair Rational Secret Sharing
Gilad Asharov
Yehuda Lindell