


default search action
EUROCRYPT 2009: Cologne, Germany
- Antoine Joux:

Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings. Lecture Notes in Computer Science 5479, Springer 2009, ISBN 978-3-642-01000-2
Security, Proofs and Models (1)
- Mihir Bellare, Dennis Hofheinz, Scott Yilek:

Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. 1-35 - Divesh Aggarwal, Ueli M. Maurer:

Breaking RSA Generically Is Equivalent to Factoring. 36-53 - Vipul Goyal, Amit Sahai:

Resettably Secure Computation. 54-71 - Chi-Jen Lu:

On the Security Loss in Cryptographic Reductions. 72-87
Hash Cryptanalysis
- Praveen Gauravaram

, Lars R. Knudsen:
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. 88-105 - Lars R. Knudsen

, Florian Mendel
, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of MDC-2. 106-120 - Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan:

Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. 121-133 - Yu Sasaki, Kazumaro Aoki:

Finding Preimages in Full MD5 Faster Than Exhaustive Search. 134-152
Group and Broadcast Encryption
- Qianhong Wu, Yi Mu, Willy Susilo

, Bo Qin, Josep Domingo-Ferrer:
Asymmetric Group Key Agreement. 153-170 - Craig Gentry, Brent Waters:

Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). 171-188 - Olivier Billet, Duong Hieu Phan

:
Traitors Collaborating in Public: Pirates 2.0. 189-205
Cryptosystems (1)
- Bhavana Kanukurthi, Leonid Reyzin:

Key Agreement from Close Secrets over Unsecured Channels. 206-223 - Alexandra Boldyreva, Nathan Chenette, Younho Lee

, Adam O'Neill:
Order-Preserving Symmetric Encryption. 224-241 - Kan Yasuda:

A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. 242-259
Cryptanalysis
- Guilhem Castagnos, Fabien Laguillaumie:

On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. 260-277 - Itai Dinur, Adi Shamir:

Cube Attacks on Tweakable Black Box Polynomials. 278-299 - Khaled Ouafi, Serge Vaudenay:

Smashing SQUASH-0. 300-312
Cryptosystems (2)
- Dennis Hofheinz, Eike Kiltz

:
Practical Chosen Ciphertext Secure Encryption from Factoring. 313-332 - Susan Hohenberger, Brent Waters:

Realizing Hash-and-Sign Signatures under Standard Assumptions. 333-350 - Jan Camenisch, Nishanth Chandran, Victor Shoup:

A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. 351-368
Invited Talk
- Shafi Goldwasser:

Cryptography without (Hardly Any) Secrets ? 369-370
Security, Proofs and Models (2)
- Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton:

Salvaging Merkle-Damgård for Practical Applications. 371-388 - Eike Kiltz

, Krzysztof Pietrzak:
On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. 389-406 - Mihir Bellare, Thomas Ristenpart:

Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. 407-424 - Jan Camenisch, Aggelos Kiayias, Moti Yung:

On the Portability of Generalized Schnorr Proofs. 425-442
Side Channels
- François-Xavier Standaert

, Tal Malkin, Moti Yung:
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. 443-461 - Krzysztof Pietrzak:

A Leakage-Resilient Mode of Operation. 462-482
Curves
- Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang:

ECM on Graphics Cards. 483-501 - Christophe Doche

, David R. Kohel, Francesco Sica
:
Double-Base Number System for Multi-scalar Multiplications. 502-517 - Steven D. Galbraith

, Xibin Lin, Michael Scott:
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. 518-535 - Takakazu Satoh:

Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields. 536-553
Randomness
- Michel Abdalla

, Dario Catalano, Dario Fiore:
Verifiable Random Functions from Identity-Based Key Encapsulation. 554-571 - Céline Chevalier, Pierre-Alain Fouque, David Pointcheval

, Sébastien Zimmer:
Optimal Randomness Extraction from a Diffie-Hellman Element. 572-589 - Eike Kiltz

, Krzysztof Pietrzak, Martijn Stam, Moti Yung:
A New Randomness Extraction Paradigm for Hybrid Encryption. 590-609

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














