Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project

CRYPTO 2008:

David Wagner (Ed.):
Advances in Cryptology - CRYPTO 2008,
28th Annual International Cryptology Conference,
Santa Barbara, CA, USA,
August 17-21, 2008.
Proceedings.



Preface by David Wagner

Sponsored by the
International Association for Cryptologic Research (IACR)

in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy,
Computer Science Department, University of California, Santa Barbara

General Chair
Susan Langford, Hewlett-Packard Company


Program Chair
David Wagner, UC Berkeley

Program Commitee
Boaz Barak Princeton University
John Black University of Colorado at Boulder
Xavier Boyen Voltage Security
Melissa Chase Brown University
Jean-Sebastien Coron University of Luxembourg
Yevgeniy Dodis New York University
Orr Dunkelman KU Leuven
Matt Franklin UC Davis
Craig Gentry Stanford University
Henri Gilbert Orange Labs
Kristian Gjosteen Norwegian University of Science and Technology
Louis Granboulan European Aeronautic Defence and Space Company
Danny Harnik IBM Haifa Research Lab
Susan Hohenberger Johns Hopkins University
Nick Hopper University of Minnesota
Yuval Ishai Technion Institute and UCLA
Thomas Johansson Lund University
Ari Juels RSA Laboratories
Lars Knudsen DTU Mathematics
Kristin Lauter Microsoft Research
Yehuda Lindell Bar Ilan University
Tal Malkin Columbia University
Manoj Prabhakaran University of Illinois, Urbana-Champaign
Zulfikar Ramzan Symantec
Renato Renner ETH Zurich
Matt Robshaw Orange Labs
Alon Rosen Herzliya Interdisciplinary Center
Amit Sahai UCLA
Hovav Shacham UC San Diego
Tom Shrimpton Portland State University and University of Lugano
Adam Smith Pennsylvania State University
Serge Vaudenay EPFL
Brent Waters SRI International
Lisa Yin Independent Consultant

Advisory Members
Alfred Menezes (CRYPTO 2007 Program Chair) University of Waterloo
Shai Halevi (CRYPTO 2009 Program Chair) IBM Research

External Reviewers



Random Oracles

Applications

Public-Key Crypto I

Hash Functions I

Cryptanalysis I

Multiparty Computation I

Cryptanalysis II

Public-Key Crypto II

Hash Functions II

Privacy

Multiparty Computation II

Zero Knowledge

Oblivious Transfer



Author Index