Advances in Cryptology - EUROCRYPT 2007,
26th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Barcelona, Spain,
May 20-24, 2007
Proceedings.
Moni Naor (Ed.):
Sponsored by the International Association for Cryptologic Research
in cooperation with
the Research Group on Mathematics Applied to Cryptography at UPC
the Research Group on Information Security at UMA
General Co-Chairs
Javier López and Germán Sáez
Program Chair
Moni Naor
Program Committee
Michel Abdalla (ENS) | Alexander May (TU Darmstadt) | |
Anne Canteaut (INRIA-Rocquencourt) | Steven Myers (University of Indiana) | |
Dario Catalano (University of Catania) | Moni Naor (chair) (Weizmann Institute of Science) | |
Jung Hee Cheon (Seoul National University) | Phong Nguyen (CNRS/ENS, Paris) | |
Stefan Dziembowski (Warsaw University & University of Rome 1) | Jesper Buus Nielsen (Aarhus University) | |
Serge Fehr (CWI) | Giuseppe Persiano (University of Salerno) | |
Marc Fischlin (TU Darmstadt) | Ron Rivest (MIT) | |
Jens Groth (UCLA) | Alon Rosen (Harvard) | |
Shai Halevi (IBM Watson Research Center) | Eran Tromer (MIT) | |
Yuval Ishai (Technion) | Brent Waters (SRI) | |
Joe Kilian (Rutgers University) | Xiaoyun Wang (Tsinghua University) | |
Anna Lysyanskaya (Brown University) | Stefan Wolf (ETH Zurich) | |
Advisory members: Nigel Smart (University of Bristol), Serge Vaudenay (EPFL) |
Archived conference information page
Proceedings:
-
Marc Stevens
,
Arjen K. Lenstra
,
Benne de Weger
:
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities , ( .ps ). 1-22
BibTeX -
Krzysztof Pietrzak
:
Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist , ( .ps ). 23-33
BibTeX -
John P. Steinberger
:
The Collision Intractability of MDC-2 in the Ideal-Cipher Model , ( .ps ). 34-51
BibTeX -
Yehuda Lindell
,
Benny Pinkas
:
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , ( .ps ). 52-78
BibTeX -
David P. Woodruff
:
Revisiting the Efficiency of Malicious Two-Party Computation , ( .ps ). 79-96
BibTeX -
Stanislaw Jarecki
,
Vitaly Shmatikov
:
Efficient Two-Party Secure Computation on Committed Inputs , ( .ps ). 97-114
BibTeX -
Jonathan Katz
:
Universally Composable Multi-party Computation Using Tamper-Proof Hardware , ( .ps ). 115-128
BibTeX -
Moti Yung
,
Yunlei Zhao
:
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model , ( .ps ). 129-147
BibTeX -
Yi Deng
,
Dongdai Lin
:
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability , ( .ps ). 148-168
BibTeX -
Chun-Yuan Hsiao
,
Chi-Jen Lu
,
Leonid Reyzin
:
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility , ( .ps ). 169-186
BibTeX -
Shien Jin Ong
,
Salil P. Vadhan
:
Zero Knowledge and Soundness Are Symmetric , ( .ps ). 187-209
BibTeX -
Xavier Boyen
:
Mesh Signatures , ( .ps ). 210-227
BibTeX -
Thomas Ristenpart
,
Scott Yilek
:
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks , ( .ps ). 228-245
BibTeX -
Jan Camenisch
,
Susan Hohenberger
,
Michael Østergaard Pedersen
:
Batch Verification of Short Signatures , ( .ps ). 246-263
BibTeX -
Vivien Dubois
,
Pierre-Alain Fouque
,
Jacques Stern
:
Cryptanalysis of SFLASH with Slightly Modified Parameters , ( .ps ). 264-275
BibTeX -
Hongjun Wu
,
Bart Preneel
:
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy , ( .ps ). 276-290
BibTeX -
Hao Chen
,
Ronald Cramer
,
Shafi Goldwasser
,
Robbert de Haan
,
Vinod Vaikuntanathan
:
Secure Computation from Random Error Correcting Codes , ( .ps ). 291-310
BibTeX -
Jonathan Katz
,
Chiu-Yuen Koo
:
Round-Efficient Secure Computation in Point-to-Point Networks , ( .ps ). 311-328
BibTeX -
Ronald Cramer
,
Ivan Damgård
,
Robbert de Haan
:
Atomic Secure Multi-party Multiplication with Low Communication , ( .ps ). 329-346
BibTeX -
Lorenz Minder
,
Amin Shokrollahi
:
Cryptanalysis of the Sidelnikov Cryptosystem , ( .ps ). 347-360
BibTeX -
Aurélie Bauer
,
Antoine Joux
:
Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables , ( .ps ). 361-378
BibTeX -
Andreas Enge
,
Pierrick Gaudry
:
An L (1/3 + epsilon ) Algorithm for the Discrete Logarithm Problem for Low Degree Curves , ( .ps ). 379-393
BibTeX -
Xavier Boyen
:
General Ad Hoc Encryption from Exponent Inversion IBE , ( .ps ). 394-411
BibTeX -
Ivan Damgård
,
Rune Thorbek
:
Non-interactive Proofs for Integer Multiplication , ( .ps ). 412-429
BibTeX -
Robert Granger
,
Florian Hess
,
Roger Oyono
,
Nicolas Thériault
,
Frederik Vercauteren
:
Ate Pairing on Hyperelliptic Curves , ( .ps ). 430-447
BibTeX -
Oriol Farràs
,
Jaume Martí-Farré
,
Carles Padró
:
Ideal Multipartite Secret Sharing Schemes , ( .ps ). 448-465
BibTeX -
Willi Geiselmann
,
Rainer Steinwandt
:
Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit , ( .ps ). 466-481
BibTeX -
Sébastien Canard
,
Aline Gouget
:
Divisible E-Cash Systems Can Be Truly Anonymous , ( .ps ). 482-497
BibTeX -
Ueli M. Maurer
,
Johan Sjödin
:
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security , ( .ps ). 498-516
BibTeX -
Krzysztof Pietrzak
,
Johan Sjödin
:
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly , ( .ps ). 517-533
BibTeX -
Yevgeniy Dodis
,
Prashant Puniya
:
Feistel Networks Made Public, and Applications , ( .ps ). 534-554
BibTeX -
Jürg Wullschleger
:
Oblivious-Transfer Amplification , ( .ps ). 555-572
BibTeX -
Jan Camenisch
,
Gregory Neven
,
Abhi Shelat
:
Simulatable Adaptive Oblivious Transfer , ( .ps ). 573-590
BibTeX