CRYPTO 2009:
Shai Halevi (Eds.):
Advances in Cryptology - CRYPTO 2009,
29th Annual International Cryptology Conference,
Santa Barbara, CA, USA,
August 16-20, 2009
Proceedings.
CRYPTO 2009
Santa Barbara, CA, USA,
August 16-20, 2009
Organizational Committee
Program Chairs : | Shai Halevi | |
General Chair : | John Black | |
Advisory Members : | David Wagner (CRYPTO 2008 Program Chair), UC Berkley | |
Tal Rabin (CRYPTO 2010 Program Chair), IBM Research |
in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy,
Computer Science Department, University of California, Santa Barbara
Program Committee
Masayuki Abe
Dan Boneh Christophe De Cannière Jean-Sébastien Coron Marc Fischlin Steven D. Galbraith Shafi Goldwasser Jens Groth Iftach Haitner Shai Halevi Yuval Ishai Marc Joye Jonathan Katz Kaoru Kurosawa Anna Lysyanskaya |
Phong Q. Nguyen
Jesper Buus Nielsen Christof Paar Rafael Pass Chris Peikert Krzysztof Pietrzak Benny Pinkas Bart Preneel Renato Renner Igor E. Shparlinski Adam Smith Eran Tromer Salil P. Vadhan Yiqun Lisa Yin Moti Yung |
External Referees
Key Leakage
-
Reconstructing RSA Private Keys from Random Key Bits.
, 1-17,
Hovav Shacham
,
Nadia Heninger
bib info -
Public-Key Cryptosystems Resilient to Key Leakage.
, 18-35,
Moni Naor
,
Gil Segev
bib info -
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.
, 36-54,
Joël Alwen
,
Yevgeniy Dodis
,
Daniel Wichs
bib info
Hash-Function Cryptanalysis
-
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate.
, 55-69,
Arjen K. Lenstra
,
David Molnar
,
Dag Arne Osvik
,
Benne de Weger
,
Marc Stevens
,
Alexander Sotirov
,
Jacob Appelbaum
bib info -
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1.
, 70-89,
Kazumaro Aoki
,
Yu Sasaki
bib info
Privacy and Anonymity
-
Private Mutual Authentication and Conditional Oblivious Transfer.
, 90-107,
Stanislaw Jarecki
,
Xiaomin Liu
bib info -
Randomizable Proofs and Delegatable Anonymous Credentials.
, 108-125,
Jan Camenisch
,
Hovav Shacham
,
Anna Lysyanskaya
,
Melissa Chase
,
Markulf Kohlweiss
,
Mira Belenkiy
bib info -
Computational Differential Privacy.
, 126-142,
Ilya Mironov
,
Salil P. Vadhan
,
Omer Reingold
,
Omkant Pandey
bib info
Interactive Proofs and Zero-Knowledge
-
Probabilistically Checkable Arguments.
, 143-159,
Yael Tauman Kalai
,
Ran Raz
bib info -
On the Composition of Public-Coin Zero-Knowledge Protocols.
, 160-176,
Rafael Pass
,
Douglas Wikström
,
Wei-Lung Dustin Tseng
bib info -
On the Amortized Complexity of Zero-Knowledge Protocols.
, 177-191,
Ronald Cramer
,
Ivan Damgård
bib info -
Linear Algebra with Sub-linear Zero-Knowledge Arguments.
, 192-208,
Jens Groth
bib info
Block-Cipher Cryptanalysis
-
New Birthday Attacks on Some MACs Based on Block Ciphers.
, 209-230,
Xiaoyun Wang
,
Guangwu Xu
,
Wei Wang
,
Keting Jia
,
Zheng Yuan
bib info -
Distinguisher and Related-Key Attack on the Full AES-256.
, 231-249,
Alex Biryukov
,
Dmitry Khovratovich
,
Ivica Nikolic
bib info -
Cryptanalysis of C2.
, 250-266,
Lars R. Knudsen
,
Gregor Leander
,
Krystian Matusiewicz
,
Julia Borghoff
bib info
Modes of Operation
-
Message Authentication Codes from Unpredictable Block Ciphers.
, 267-285,
Yevgeniy Dodis
,
John P. Steinberger
bib info
Elliptic Curves
-
How to Hash into Elliptic Curves.
, 303-316,
Thomas Icart
bib info -
Batch Binary Edwards.
, 317-336,
Daniel J. Bernstein
bib info
Cryptographic Hardness
-
Solving Hidden Number Problem with One Bit Oracle and Advice.
, 337-354,
Adi Akavia
bib info -
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition.
, 355-373,
Ueli M. Maurer
,
Stefano Tessaro
bib info
Merkle Puzzles
-
Merkle Puzzles Are Optimal - An
O
(
n
2
)-Query Attack on Any Key Exchange from a Random Oracle.
, 374-390,
Boaz Barak
,
Mohammad Mahmoody-Ghidary
bib info
Cryptography in the Physical World
-
Position Based Cryptography.
, 391-407,
Rafail Ostrovsky
,
Vipul Goyal
,
Ryan Moriarty
,
Nishanth Chandran
bib info -
Improving the Security of Quantum Protocols via Commit-and-Open.
, 408-427,
Serge Fehr
,
Ivan Damgård
,
Louis Salvail
,
Christian Schaffner
,
Carolin Lunemann
bib info
Attacks on Signature Schemes
-
Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures.
, 428-444,
Jean-Sébastien Coron
,
David Naccache
,
Ralf-Philipp Weinmann
,
Mehdi Tibouchi
bib info -
How Risky Is the Random-Oracle Model?
, 445-464,
Phong Q. Nguyen
,
Gaëtan Leurent
bib info
Invited Talk
Secret Sharing and Secure Computation
-
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over
Any
Fixed Finite Field.
, 466-486,
Ronald Cramer
,
Chaoping Xing
,
Hao Chen
,
Ignacio Cascudo Pueyo
bib info -
The Round Complexity of Verifiable Secret Sharing Revisited.
, 487-504,
C. Pandu Rangan
,
Tal Rabin
,
Arpita Patra
,
Ashish Choudhary
bib info -
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
, 505-523,
Juan A. Garay
,
Hong-Sheng Zhou
,
Daniel Wichs
bib info
Cryptography and Game-Theory
-
Collusion-Free Multiparty Computation in the Mediated Model.
, 524-540,
Giuseppe Persiano
,
Ivan Visconti
,
Jonathan Katz
,
Abhi Shelat
,
Joël Alwen
,
Yehuda Lindell
bib info -
Privacy-Enhancing Auctions Using Rational Cryptography.
, 541-558,
Jesper Buus Nielsen
,
Nikos Triandopoulos
,
Peter Bro Miltersen
bib info -
Utility Dependence in Correct and Fair Rational Secret Sharing.
, 559-576,
Yehuda Lindell
,
Gilad Asharov
bib info
Cryptography and Lattices
-
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem.
, 577-594,
Daniele Micciancio
,
Vadim Lyubashevsky
bib info -
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems.
, 595-618,
Chris Peikert
,
Amit Sahai
,
Benny Applebaum
,
David Cash
bib info
Identity-Based Encryption
-
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions.
, 619-636,
Brent Waters
bib info
Cryptographers' Toolbox
-
The Group of Signed Quadratic Residues and Applications.
, 637-653,
Eike Kiltz
,
Dennis Hofheinz
bib info -
Short and Stateless Signatures from the RSA Assumption.
, 654-670,
Susan Hohenberger
,
Brent Waters
bib info -
Smooth Projective Hashing for Conditionally Extractable Commitments.
, 671-689,
Michel Abdalla
,
David Pointcheval
,
Céline Chevalier
bib info
Author Index