


default search action
29th CRYPTO 2009: Santa Barbara, California, USA
- Shai Halevi:

Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings. Lecture Notes in Computer Science 5677, Springer 2009, ISBN 978-3-642-03355-1
Key Leakage
- Nadia Heninger, Hovav Shacham:

Reconstructing RSA Private Keys from Random Key Bits. 1-17 - Moni Naor, Gil Segev:

Public-Key Cryptosystems Resilient to Key Leakage. 18-35 - Joël Alwen, Yevgeniy Dodis, Daniel Wichs:

Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. 36-54
Hash-Function Cryptanalysis
- Marc Stevens

, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger:
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. 55-69 - Kazumaro Aoki, Yu Sasaki:

Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. 70-89
Privacy and Anonymity
- Stanislaw Jarecki, Xiaomin Liu:

Private Mutual Authentication and Conditional Oblivious Transfer. 90-107 - Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss

, Anna Lysyanskaya, Hovav Shacham:
Randomizable Proofs and Delegatable Anonymous Credentials. 108-125 - Ilya Mironov

, Omkant Pandey, Omer Reingold, Salil P. Vadhan:
Computational Differential Privacy. 126-142
Interactive Proofs and Zero-Knowledge
- Yael Tauman Kalai, Ran Raz:

Probabilistically Checkable Arguments. 143-159 - Rafael Pass

, Wei-Lung Dustin Tseng, Douglas Wikström:
On the Composition of Public-Coin Zero-Knowledge Protocols. 160-176 - Ronald Cramer, Ivan Damgård:

On the Amortized Complexity of Zero-Knowledge Protocols. 177-191 - Jens Groth

:
Linear Algebra with Sub-linear Zero-Knowledge Arguments. 192-208
Block-Cipher Cryptanalysis
- Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang:

New Birthday Attacks on Some MACs Based on Block Ciphers. 209-230 - Alex Biryukov

, Dmitry Khovratovich, Ivica Nikolic:
Distinguisher and Related-Key Attack on the Full AES-256. 231-249 - Julia Borghoff, Lars R. Knudsen, Gregor Leander

, Krystian Matusiewicz:
Cryptanalysis of C2. 250-266
Modes of Operation
- Yevgeniy Dodis, John P. Steinberger:

Message Authentication Codes from Unpredictable Block Ciphers. 267-285 - Ben Morris, Phillip Rogaway, Till Stegers:

How to Encipher Messages on a Small Domain. 286-302
Elliptic Curves
- Thomas Icart:

How to Hash into Elliptic Curves. 303-316 - Daniel J. Bernstein:

Batch Binary Edwards. 317-336
Cryptographic Hardness
- Adi Akavia:

Solving Hidden Number Problem with One Bit Oracle and Advice. 337-354 - Ueli M. Maurer, Stefano Tessaro:

Computational Indistinguishability Amplification: Tight Product Theorems for System Composition. 355-373
Merkle Puzzles
- Boaz Barak, Mohammad Mahmoody-Ghidary

:
Merkle Puzzles Are Optimal - An O(n2)-Query Attack on Any Key Exchange from a Random Oracle. 374-390
Cryptography in the Physical World
- Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky:

Position Based Cryptography. 391-407 - Ivan Damgård, Serge Fehr, Carolin Lunemann, Louis Salvail, Christian Schaffner

:
Improving the Security of Quantum Protocols via Commit-and-Open. 408-427
Attacks on Signature Schemes
- Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi

, Ralf-Philipp Weinmann:
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. 428-444 - Gaëtan Leurent

, Phong Q. Nguyen:
How Risky Is the Random-Oracle Model? 445-464
Invited Talk
- Ueli M. Maurer:

Abstraction in Cryptography. 465
Secret Sharing and Secure Computation
- Ignacio Cascudo Pueyo

, Hao Chen, Ronald Cramer, Chaoping Xing
:
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. 466-486 - Arpita Patra, Ashish Choudhary

, Tal Rabin, C. Pandu Rangan:
The Round Complexity of Verifiable Secret Sharing Revisited. 487-504 - Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou

:
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. 505-523
Cryptography and Game-Theory
- Joël Alwen, Jonathan Katz, Yehuda Lindell

, Giuseppe Persiano, Abhi Shelat, Ivan Visconti:
Collusion-Free Multiparty Computation in the Mediated Model. 524-540 - Peter Bro Miltersen, Jesper Buus Nielsen

, Nikos Triandopoulos:
Privacy-Enhancing Auctions Using Rational Cryptography. 541-558 - Gilad Asharov

, Yehuda Lindell
:
Utility Dependence in Correct and Fair Rational Secret Sharing. 559-576
Cryptography and Lattices
- Vadim Lyubashevsky

, Daniele Micciancio
:
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem. 577-594 - Benny Applebaum, David Cash, Chris Peikert, Amit Sahai:

Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. 595-618
Identity-Based Encryption
- Brent Waters:

Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. 619-636
Cryptographers' Toolbox
- Dennis Hofheinz, Eike Kiltz

:
The Group of Signed Quadratic Residues and Applications. 637-653 - Susan Hohenberger, Brent Waters:

Short and Stateless Signatures from the RSA Assumption. 654-670 - Michel Abdalla

, Céline Chevalier, David Pointcheval
:
Smooth Projective Hashing for Conditionally Extractable Commitments. 671-689

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














