IACR EUROCRYPT 2000: Bruges, Belgium
This html page is provided courtesy of Michael Ley and his Computer Science Bibliography Database project.
The page numbers here are the "as published" numbers and are suitable for citations. The page numbers in the files linked from here may differ slightly.
Bart Preneel (Ed.): Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceedings.
Preface
Factoring and Discrete Logarithm
-
Stefania Cavallar
,
Bruce Dodson
,
Arjen K. Lenstra
,
Walter M. Lioen
,
Peter L. Montgomery
,
Brian Murphy
,
Herman te Riele
,
Karen Aardal
,
Jeff Gilchrist
,
Gérard Guillerm
,
Paul C. Leyland
,
Joël Marchand
,
François Morain
,
Alec Muffett
,
Chris Putnam
,
Craig Putnam
,
Paul Zimmermann
:
Factorization of a 512-Bit RSA Modulus . 1-18
BibTeX -
Pierrick Gaudry
:
An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves. 19-34
BibTeX -
Arjen K. Lenstra
,
Adi Shamir
:
Analysis and Optimization of the TWINKLE Factoring Device. 35-52
BibTeX
Cryptanalysis I: Digital Signatures
-
Daniel Bleichenbacher
,
Phong Q. Nguyen
:
Noisy Polynomial Interpolation and Noisy Chinese Remaindering. 53-69
BibTeX -
François Grieu
:
A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme. 70-80
BibTeX -
Marc Girault
,
Jean-François Misarsky
:
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1. 81-90
BibTeX -
Jean-Sébastien Coron
,
David Naccache
:
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. 91-101
BibTeX
Invited Talk
Private Information Retrieval
-
Eyal Kushilevitz
,
Rafail Ostrovsky
:
One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval. 104-121
BibTeX -
Giovanni Di Crescenzo
,
Tal Malkin
,
Rafail Ostrovsky
:
Single Database Private Information Retrieval Implies Oblivious Transfer. 122-138
BibTeX
Key Management Protocols
-
Mihir Bellare
,
David Pointcheval
,
Phillip Rogaway
:
Authenticated Key Exchange Secure against Dictionary Attacks. 139-155
BibTeX -
Victor Boyko
,
Philip D. MacKenzie
,
Sarvar Patel
:
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. 156-171
BibTeX -
Guillaume Poupard
,
Jacques Stern
:
Fair Encryption of RSA Keys. 172-189
BibTeX
Threshold Cryptography and Digital Signatures
-
Dario Catalano
,
Rosario Gennaro
,
Shai Halevi
:
Computing Inverses over a Shared Secret Modulus. 190-206
BibTeX -
Victor Shoup
:
Practical Threshold Signatures. 207-220
BibTeX -
Stanislaw Jarecki
,
Anna Lysyanskaya
:
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. 221-242 BibTeX -
Jan Camenisch
,
Markus Michels
:
Confirmer Signature Schemes Secure against Adaptive Adversaries. 243-258 BibTeX
Public-Key Encryption
-
Mihir Bellare
,
Alexandra Boldyreva
,
Silvio Micali
:
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. 259-274 BibTeX -
Victor Shoup
:
Using Hash Functions as a Hedge against Chosen Ciphertext Attack. 275-288 BibTeX
Quantum Cryptography
-
Gilles Brassard
,
Norbert Lütkenhaus
,
Tal Mor
,
Barry C. Sanders
:
Security Aspects of Practical Quantum Cryptography. 289-299 BibTeX -
Paul Dumais
,
Dominic Mayers
,
Louis Salvail
:
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation. 300-315 BibTeX
Multi-party Computation and Information Theory
-
Ronald Cramer
,
Ivan Damgård
,
Ueli M. Maurer
:
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. 316-334 BibTeX -
Donald Beaver
:
Minimal-Latency Secure Function Evaluation. 335-350 BibTeX -
Ueli M. Maurer
,
Stefan Wolf
:
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. 351-368 BibTeX
Cryptanalysis II: Public-Key Encryption
-
Jean-Sébastien Coron
,
Marc Joye
,
David Naccache
,
Pascal Paillier
:
New Attacks on PKCS#1 v1.5 Encryption. 369-381 BibTeX -
Éliane Jaulmes
,
Antoine Joux
:
A NICE Cryptanalysis. 382-391 BibTeX -
Nicolas Courtois
,
Alexander Klimov
,
Jacques Patarin
,
Adi Shamir
:
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. 392-407 BibTeX -
Eli Biham
:
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). 408-416 BibTeX
Invited Talk
Zero-Knowledge
-
Ivan Damgård
:
Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. 418-430 BibTeX -
Fabrice Boudot
:
Efficient Proofs that a Committed Number Lies in an Interval. 431-444 BibTeX
Symmetric Cryptography
-
Victor Shoup
:
A Composition Theorem for Universal One-Way Hash Functions. 445-452 BibTeX -
Ran Canetti
,
Yevgeniy Dodis
,
Shai Halevi
,
Eyal Kushilevitz
,
Amit Sahai
:
Exposure-Resilient Functions and All-or-Nothing Transforms. 453-469 BibTeX -
Stefan Lucks
:
The Sum of PRPs Is a Secure PRF. 470-484 BibTeX
Boolean Functions and Hardware
-
Palash Sarkar
,
Subhamoy Maitra
:
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties. 485-506 BibTeX -
Anne Canteaut
,
Claude Carlet
,
Pascale Charpin
,
Caroline Fontaine
:
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions. 507-522 BibTeX -
Shin-ichi Kawamura
,
Masanobu Koike
,
Fumihiko Sano
,
Atsushi Shimbo
:
Cox-Rower Architecture for Fast Parallel Montgomery Multiplication. 523-538 BibTeX
Voting Schemes
-
Martin Hirt
,
Kazue Sako
:
Efficient Receipt-Free Voting Based on Homomorphic Encryption. 539-556 BibTeX -
Yvo Desmedt
,
Kaoru Kurosawa
:
How to Break a Practical MIX and Design a New One. 557-572 BibTeX
Cryptanalysis III: Stream Ciphers and Block Ciphers
-
Anne Canteaut
,
Michaël Trabbia
:
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. 573-588 BibTeX -
Alex Biryukov
,
David Wagner
:
Advanced Slide Attacks. 589-606 BibTeX