EUROCRYPT 2008:
Istanbul,
Turkey
Nigel P. Smart (Ed.):
Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings.
Lecture Notes in Computer Science 4965 Springer 2008, ISBN 978-3-540-78966-6 BibTeX
- Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel:
A Practical Attack on KeeLoq.
1-18
Electronic Edition (link) BibTeX
- Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern:
Key Recovery on Hidden Monomial Multivariate Schemes.
19-30
Electronic Edition (link) BibTeX
- Nicolas Gama, Phong Q. Nguyen:
Predicting Lattice Reduction.
31-51
Electronic Edition (link) BibTeX
- Gregory Neven:
Efficient Sequential Aggregate Signed Data.
52-69
Electronic Edition (link) BibTeX
- Daniel J. Bernstein:
Proving Tight Security for Rabin-Williams Signatures.
70-87
Electronic Edition (link) BibTeX
- Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups.
88-107
Electronic Edition (link) BibTeX
- Dennis Hofheinz, Dominique Unruh:
Towards Key-Dependent Message Security in the Standard Model.
108-126
Electronic Edition (link) BibTeX
- David Cash, Eike Kiltz, Victor Shoup:
The Twin Diffie-Hellman Problem and Applications.
127-145
Electronic Edition (link) BibTeX
- Jonathan Katz, Amit Sahai, Brent Waters:
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
146-162
Electronic Edition (link) BibTeX
- Benjamin Smith:
Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves.
163-180
Electronic Edition (link) BibTeX
- Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche:
On the Indifferentiability of the Sponge Construction.
181-197
Electronic Edition (link) BibTeX
- Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya:
A New Mode of Operation for Block Ciphers and Length-Preserving MACs.
198-219
Electronic Edition (link) BibTeX
- Phillip Rogaway, John P. Steinberger:
Security/Efficiency Tradeoffs for Permutation-Based Hashing.
220-236
Electronic Edition (link) BibTeX
- Lei Wang, Kazuo Ohta, Noboru Kunihiro:
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
237-253
Electronic Edition (link) BibTeX
- Jean-Pierre Tillich, Gilles Zémor:
Collisions for the LPS Expander Graph Hash Function.
254-269
Electronic Edition (link) BibTeX
- Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer:
Second Preimage Attacks on Dithered Hash Functions.
270-288
Electronic Edition (link) BibTeX
- Vipul Goyal, Payman Mohassel, Adam Smith:
Efficient Two Party and Multi Party Computation Against Covert Adversaries.
289-306
Electronic Edition (link) BibTeX
- Juan A. Garay, Rafail Ostrovsky:
Almost-Everywhere Secure Computation.
307-323
Electronic Edition (link) BibTeX
- Kaoru Kurosawa, Kazuhiro Suzuki:
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme.
324-340
Electronic Edition (link) BibTeX
- Boaz Barak, Sharon Goldberg, David Xiao:
Protocols and Lower Bounds for Failure Localization in the Internet.
341-360
Electronic Edition (link) BibTeX
- Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
HB#: Increasing the Security and Efficiency of HB+.
361-378
Electronic Edition (link) BibTeX
- Jens Groth, Yuval Ishai:
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle.
379-396
Electronic Edition (link) BibTeX
- Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam:
Precise Concurrent Zero Knowledge.
397-414
Electronic Edition (link) BibTeX
- Jens Groth, Amit Sahai:
Efficient Non-interactive Proof Systems for Bilinear Groups.
415-432
Electronic Edition (link) BibTeX
- Dario Catalano, Dario Fiore, Mariagrazia Messina:
Zero-Knowledge Sets with Short Proofs.
433-450
Electronic Edition (link) BibTeX
- Hao Chen, Ronald Cramer, Robbert de Haan, Ignacio Cascudo Pueyo:
Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves.
451-470
Electronic Edition (link) BibTeX
- Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs:
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
471-488
Electronic Edition (link) BibTeX
- Ran Canetti, Ronny Ramzi Dakdouk:
Obfuscating Point Functions with Multibit Output.
489-508
Electronic Edition (link) BibTeX
- Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs:
Isolated Proofs of Knowledge and Isolated Zero Knowledge.
509-526
Electronic Edition (link) BibTeX
- Tal Moran, Gil Segev:
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware.
527-544
Electronic Edition (link) BibTeX
- Nishanth Chandran, Vipul Goyal, Amit Sahai:
New Constructions for UC Secure Computation Using Tamper-Proof Hardware.
545-562
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:11:09 2009
by Michael Ley (ley@uni-trier.de)