Search dblp for Publications

export results for "toc:db/conf/crypto/crypto2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/crypto/AbdallaCP09,
  author       = {Michel Abdalla and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Shai Halevi},
  title        = {Smooth Projective Hashing for Conditionally Extractable Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {671--689},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_39},
  doi          = {10.1007/978-3-642-03356-8\_39},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Akavia09,
  author       = {Adi Akavia},
  editor       = {Shai Halevi},
  title        = {Solving Hidden Number Problem with One Bit Oracle and Advice},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {337--354},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_20},
  doi          = {10.1007/978-3-642-03356-8\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Akavia09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenDW09,
  author       = {Jo{\"{e}}l Alwen and
                  Yevgeniy Dodis and
                  Daniel Wichs},
  editor       = {Shai Halevi},
  title        = {Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval
                  Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {36--54},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_3},
  doi          = {10.1007/978-3-642-03356-8\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenDW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenKLPSV09,
  author       = {Jo{\"{e}}l Alwen and
                  Jonathan Katz and
                  Yehuda Lindell and
                  Giuseppe Persiano and
                  Abhi Shelat and
                  Ivan Visconti},
  editor       = {Shai Halevi},
  title        = {Collusion-Free Multiparty Computation in the Mediated Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {524--540},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_31},
  doi          = {10.1007/978-3-642-03356-8\_31},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenKLPSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AokiS09,
  author       = {Kazumaro Aoki and
                  Yu Sasaki},
  editor       = {Shai Halevi},
  title        = {Meet-in-the-Middle Preimage Attacks Against Reduced {SHA-0} and {SHA-1}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {70--89},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_5},
  doi          = {10.1007/978-3-642-03356-8\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AokiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumCPS09,
  author       = {Benny Applebaum and
                  David Cash and
                  Chris Peikert and
                  Amit Sahai},
  editor       = {Shai Halevi},
  title        = {Fast Cryptographic Primitives and Circular-Secure Encryption Based
                  on Hard Learning Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {595--618},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_35},
  doi          = {10.1007/978-3-642-03356-8\_35},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumCPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AsharovL09,
  author       = {Gilad Asharov and
                  Yehuda Lindell},
  editor       = {Shai Halevi},
  title        = {Utility Dependence in Correct and Fair Rational Secret Sharing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {559--576},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_33},
  doi          = {10.1007/978-3-642-03356-8\_33},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AsharovL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakM09,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  editor       = {Shai Halevi},
  title        = {Merkle Puzzles Are Optimal - An \emph{O}(\emph{n}\({}^{\mbox{2}}\))-Query
                  Attack on Any Key Exchange from a Random Oracle},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {374--390},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_22},
  doi          = {10.1007/978-3-642-03356-8\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BarakM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelenkiyCCKLS09,
  author       = {Mira Belenkiy and
                  Jan Camenisch and
                  Melissa Chase and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya and
                  Hovav Shacham},
  editor       = {Shai Halevi},
  title        = {Randomizable Proofs and Delegatable Anonymous Credentials},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_7},
  doi          = {10.1007/978-3-642-03356-8\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BelenkiyCCKLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bernstein09,
  author       = {Daniel J. Bernstein},
  editor       = {Shai Halevi},
  title        = {Batch Binary Edwards},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {317--336},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_19},
  doi          = {10.1007/978-3-642-03356-8\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Bernstein09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BiryukovKN09,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich and
                  Ivica Nikolic},
  editor       = {Shai Halevi},
  title        = {Distinguisher and Related-Key Attack on the Full {AES-256}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {231--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_14},
  doi          = {10.1007/978-3-642-03356-8\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BiryukovKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BorghoffKLM09,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Krystian Matusiewicz},
  editor       = {Shai Halevi},
  title        = {Cryptanalysis of {C2}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {250--266},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_15},
  doi          = {10.1007/978-3-642-03356-8\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BorghoffKLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChandranGMO09,
  author       = {Nishanth Chandran and
                  Vipul Goyal and
                  Ryan Moriarty and
                  Rafail Ostrovsky},
  editor       = {Shai Halevi},
  title        = {Position Based Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {391--407},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_23},
  doi          = {10.1007/978-3-642-03356-8\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChandranGMO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronNTW09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Ralf{-}Philipp Weinmann},
  editor       = {Shai Halevi},
  title        = {Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {428--444},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_25},
  doi          = {10.1007/978-3-642-03356-8\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronNTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerD09,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Shai Halevi},
  title        = {On the Amortized Complexity of Zero-Knowledge Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {177--191},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_11},
  doi          = {10.1007/978-3-642-03356-8\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardFLSS09,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Carolin Lunemann and
                  Louis Salvail and
                  Christian Schaffner},
  editor       = {Shai Halevi},
  title        = {Improving the Security of Quantum Protocols via Commit-and-Open},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {408--427},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_24},
  doi          = {10.1007/978-3-642-03356-8\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardFLSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisS09,
  author       = {Yevgeniy Dodis and
                  John P. Steinberger},
  editor       = {Shai Halevi},
  title        = {Message Authentication Codes from Unpredictable Block Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {267--285},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_16},
  doi          = {10.1007/978-3-642-03356-8\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayWZ09,
  author       = {Juan A. Garay and
                  Daniel Wichs and
                  Hong{-}Sheng Zhou},
  editor       = {Shai Halevi},
  title        = {Somewhat Non-committing Encryption and Efficient Adaptively Secure
                  Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {505--523},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_30},
  doi          = {10.1007/978-3-642-03356-8\_30},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarayWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Groth09,
  author       = {Jens Groth},
  editor       = {Shai Halevi},
  title        = {Linear Algebra with Sub-linear Zero-Knowledge Arguments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {192--208},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_12},
  doi          = {10.1007/978-3-642-03356-8\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Groth09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HeningerS09,
  author       = {Nadia Heninger and
                  Hovav Shacham},
  editor       = {Shai Halevi},
  title        = {Reconstructing {RSA} Private Keys from Random Key Bits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_1},
  doi          = {10.1007/978-3-642-03356-8\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HeningerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HofheinzK09,
  author       = {Dennis Hofheinz and
                  Eike Kiltz},
  editor       = {Shai Halevi},
  title        = {The Group of Signed Quadratic Residues and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {637--653},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_37},
  doi          = {10.1007/978-3-642-03356-8\_37},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HofheinzK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HohenbergerW09,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Shai Halevi},
  title        = {Short and Stateless Signatures from the {RSA} Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {654--670},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_38},
  doi          = {10.1007/978-3-642-03356-8\_38},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HohenbergerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Icart09,
  author       = {Thomas Icart},
  editor       = {Shai Halevi},
  title        = {How to Hash into Elliptic Curves},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {303--316},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_18},
  doi          = {10.1007/978-3-642-03356-8\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Icart09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JareckiL09,
  author       = {Stanislaw Jarecki and
                  Xiaomin Liu},
  editor       = {Shai Halevi},
  title        = {Private Mutual Authentication and Conditional Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_6},
  doi          = {10.1007/978-3-642-03356-8\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JareckiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiR09,
  author       = {Yael Tauman Kalai and
                  Ran Raz},
  editor       = {Shai Halevi},
  title        = {Probabilistically Checkable Arguments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {143--159},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_9},
  doi          = {10.1007/978-3-642-03356-8\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LeurentN09,
  author       = {Ga{\"{e}}tan Leurent and
                  Phong Q. Nguyen},
  editor       = {Shai Halevi},
  title        = {How Risky Is the Random-Oracle Model?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {445--464},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_26},
  doi          = {10.1007/978-3-642-03356-8\_26},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LeurentN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LyubashevskyM09,
  author       = {Vadim Lyubashevsky and
                  Daniele Micciancio},
  editor       = {Shai Halevi},
  title        = {On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum
                  Distance Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {577--594},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_34},
  doi          = {10.1007/978-3-642-03356-8\_34},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LyubashevskyM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Maurer09,
  author       = {Ueli M. Maurer},
  editor       = {Shai Halevi},
  title        = {Abstraction in Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {465},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_27},
  doi          = {10.1007/978-3-642-03356-8\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Maurer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MaurerT09,
  author       = {Ueli M. Maurer and
                  Stefano Tessaro},
  editor       = {Shai Halevi},
  title        = {Computational Indistinguishability Amplification: Tight Product Theorems
                  for System Composition},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {355--373},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_21},
  doi          = {10.1007/978-3-642-03356-8\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MaurerT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MiltersenNT09,
  author       = {Peter Bro Miltersen and
                  Jesper Buus Nielsen and
                  Nikos Triandopoulos},
  editor       = {Shai Halevi},
  title        = {Privacy-Enhancing Auctions Using Rational Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {541--558},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_32},
  doi          = {10.1007/978-3-642-03356-8\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MiltersenNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MironovPRV09,
  author       = {Ilya Mironov and
                  Omkant Pandey and
                  Omer Reingold and
                  Salil P. Vadhan},
  editor       = {Shai Halevi},
  title        = {Computational Differential Privacy},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {126--142},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_8},
  doi          = {10.1007/978-3-642-03356-8\_8},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MironovPRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MorrisRS09,
  author       = {Ben Morris and
                  Phillip Rogaway and
                  Till Stegers},
  editor       = {Shai Halevi},
  title        = {How to Encipher Messages on a Small Domain},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {286--302},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_17},
  doi          = {10.1007/978-3-642-03356-8\_17},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MorrisRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorS09,
  author       = {Moni Naor and
                  Gil Segev},
  editor       = {Shai Halevi},
  title        = {Public-Key Cryptosystems Resilient to Key Leakage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {18--35},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_2},
  doi          = {10.1007/978-3-642-03356-8\_2},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PassTW09,
  author       = {Rafael Pass and
                  Wei{-}Lung Dustin Tseng and
                  Douglas Wikstr{\"{o}}m},
  editor       = {Shai Halevi},
  title        = {On the Composition of Public-Coin Zero-Knowledge Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {160--176},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_10},
  doi          = {10.1007/978-3-642-03356-8\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PassTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PatraCRR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Tal Rabin and
                  C. Pandu Rangan},
  editor       = {Shai Halevi},
  title        = {The Round Complexity of Verifiable Secret Sharing Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {487--504},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_29},
  doi          = {10.1007/978-3-642-03356-8\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PatraCRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PueyoCCX09,
  author       = {Ignacio Cascudo Pueyo and
                  Hao Chen and
                  Ronald Cramer and
                  Chaoping Xing},
  editor       = {Shai Halevi},
  title        = {Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication
                  over \emph{Any} Fixed Finite Field},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {466--486},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_28},
  doi          = {10.1007/978-3-642-03356-8\_28},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PueyoCCX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StevensSALMOW09,
  author       = {Marc Stevens and
                  Alexander Sotirov and
                  Jacob Appelbaum and
                  Arjen K. Lenstra and
                  David Molnar and
                  Dag Arne Osvik and
                  Benne de Weger},
  editor       = {Shai Halevi},
  title        = {Short Chosen-Prefix Collisions for {MD5} and the Creation of a Rogue
                  {CA} Certificate},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_4},
  doi          = {10.1007/978-3-642-03356-8\_4},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/StevensSALMOW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Waters09,
  author       = {Brent Waters},
  editor       = {Shai Halevi},
  title        = {Dual System Encryption: Realizing Fully Secure {IBE} and {HIBE} under
                  Simple Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {619--636},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_36},
  doi          = {10.1007/978-3-642-03356-8\_36},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Waters09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YuanWJXW09,
  author       = {Zheng Yuan and
                  Wei Wang and
                  Keting Jia and
                  Guangwu Xu and
                  Xiaoyun Wang},
  editor       = {Shai Halevi},
  title        = {New Birthday Attacks on Some MACs Based on Block Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {209--230},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_13},
  doi          = {10.1007/978-3-642-03356-8\_13},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/YuanWJXW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2009,
  editor       = {Shai Halevi},
  title        = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8},
  doi          = {10.1007/978-3-642-03356-8},
  isbn         = {978-3-642-03355-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics