EUROCRYPT 2009:
Antoine Joux (Ed.):
EUROCRYPT 2009,
Cologne, Germany.
Proceedings.
EUROCRYPT 2009
Organizational Committee
Program Chair : | Antoine Joux | |
General Chair : | Alexander May | |
Co-Chairs : | ||
Roberto Avanzi | Christof Paar | |
Ahmad Sadeghi | Jörg Schwenk | |
Christopher Wolf |
Program Committee
Paulo S. L. M. Barreto |
Alexandra Boldyreva |
Colin Boyd |
Xavier Boyen |
Mike Burmester |
Serge Fehr |
Marc Fischlin |
Pierre-Alain Fouque |
Craig Gentry |
Helena Handschuh |
Nick Howgrave-Graham |
Thomas Johansson |
Jonathan Katz |
John Kelsey |
Kwangjo Kim |
Kaoru Kurosawa |
Reynald Lercier |
Anna Lysyanskaya |
Rafail Ostrovsky |
Pascal Paillier |
Duong Hieu Phan |
Christian Rechberger |
Werner Schindler |
Thomas Shrimpton |
Nigel P. Smart |
Rainer Steinwandt |
Christine Swart |
Christopher Wolf |
External Referees
Security, Proofs and Models
-
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
, 1,
Mihir Bellare
,
Dennis Hofheinz
,
Scott Yilek
bib info -
Breaking RSA Generically is Equivalent to Factoring
, 37,
Ueli Maurer
,
Divesh Aggarwal
bib info -
Resettably Secure Computation
, 55,
Vipul Goyal
,
Amit Sahai
bib info -
On the Security Loss in Cryptographic Reductions
, 73,
Chi-Jen Lu
bib info
Hash Cryptanalysis
-
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures
, 91,
Lars R. Knudsen
,
Praveen Gauravaram
bib info -
Cryptanalysis of MDC-2
, 109,
Christian Rechberger
,
Lars R. Knudsen
,
Florian Mendel
,
Soeren S. Thomsen
bib info -
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
, 122,
Xiaoyun Wang
,
Hongbo Yu
,
Wei Wang
,
Haina Zhang
,
Tao Zhan
bib info -
Finding Preimages in Full MD5 Faster than Exhaustive Search
, 136,
Kazumaro Aoki
,
Yu Sasaki
bib info
Group and Broadcast Encryption
-
Asymmetric Group Key Agreement
, 154,
Willy Susilo
,
Josep Domingo-Ferrer
,
Yi Mu
,
Bo Qin
,
Qianhong Wu
bib info -
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
, 172,
Craig Gentry
,
Brent Waters
bib info -
Traitors Collaborating in Public: Pirates 2.0
, 190,
Olivier Billet
,
Duong-Hieu Phan
bib info
Cryptosystems
-
Key Agreement from Close Secrets over Unsecured Channels
, 207,
Leonid Reyzin
,
Bhavana Kanukurthi
bib info -
Order-Preserving Symmetric Encryption
, 225,
Alexandra Boldyreva
,
Adam O'Neill
,
Nathan Chenette
,
Younho Lee
bib info -
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier
, 243,
Kan Yasuda
bib info
Cryptanalysis
-
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis
, 261,
Fabien Laguillaumie
,
Guilhem Castagnos
bib info -
Cube Attacks on Tweakable Black Box Polynomials
, 279,
Adi Shamir
,
Itai Dinur
bib info -
Smashing SQUASH-0
, 299,
Khaled Ouafi
and
Serge Vaudenay
(no bib info available)
Cryptosystems
-
Practical Chosen Ciphertext Secure Encryption from Factoring
, 313,
Eike Kiltz
,
Dennis Hofheinz
bib info -
Realizing Hash-and-Sign Signatures under Standard Assumptions
, 333,
Susan Hohenberger
,
Brent Waters
bib info -
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
, 351,
Jan Camenisch
,
Victor Shoup
,
Nishanth Chandran
bib info
Invited Talk
Security, Proofs and Models 2
-
Salvaging Merkle-Damgård for Practical Applications
, 371,
Thomas Ristenpart
,
Thomas Shrimpton
,
Yevgeniy Dodis
bib info -
On the Security of Padding-Based Encryption Schemes (Or: Why we cannot prove OAEP secure in the Standard Model)
, 389,
Eike Kiltz
,
Krzysztof Pietrzak
bib info -
Simulation without the Artifical Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme
, 407,
Mihir Bellare
,
Thomas Ristenpart
bib info -
On the Portability of Generalized Schnorr Proofs
, 425,
Jan Camenisch
,
Moti Yung
,
Aggelos Kiayias
bib info
Side Channels
-
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
, 443,
Moti Yung
,
Tal Malkin
,
Francois-Xavier Standaert
bib info -
A Leakage-Resilient Mode of Operation
, 461,
Krzysztof Pietrzak
bib info
Curves
-
ECM on Graphics Cards
, 481,
Daniel J. Bernstein
,
Tanja Lange
,
Bo-Yin Yang
,
Chen-Mou Cheng
,
Tien-Ren Chen
bib info -
Double-Base Number System for Multi-Scalar Multiplications
, 501,
Christophe Doche
,
Francesco Sica
,
David R. Kohel
bib info -
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves}
, 519,
Michael Scott
,
Xibin Lin
,
Steven D. Galbraith
bib info -
Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields
, 537,
Takakazu Satoh
bib info
Randomness
-
Verifiable Random Functions from Identity-based Key Encapsulation
, 555,
Michel Abdalla
,
Dario Catalano
,
Dario Fiore
bib info -
Optimal Randomness Extraction from a Diffie-Hellman Element
, 573,
Pierre-Alain Fouque
,
David Pointcheval
,
Céline Chevalier
,
Sébastien Zimmer
bib info -
A New Randomness Extraction Paradigm for Hybrid Encryption
, 591,
Moti Yung
,
Eike Kiltz
,
Martijn Stam
,
Krzysztof Pietrzak
bib info
Author Index