Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Manoj Prabhakaran 0001, Mike Rosulek |
Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam D. Smith |
Scalable Multiparty Computation with Nearly Optimal Work and Resilience. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Helena Handschuh, Bart Preneel |
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum |
One-Time Programs. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rafail Ostrovsky, William E. Skeith III |
Communication Complexity in Algebraic Two-Party Protocols. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
fully homomorphic encryption, PIR writing, algebraic lower bounds, communication complexity, keyword search, private information retrieval, homomorphic encryption |
1 | Dimitar Jetchev, Ramarathnam Venkatesan |
Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Kobbi Nissim, Eran Omri |
Distributed Private Data Analysis: Simultaneously Solving How and What. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Christophe De Cannière, Christian Rechberger |
Preimages for Reduced SHA-0 and SHA-1. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0 |
1 | Ronald Cramer, Eike Kiltz, Carles Padró |
A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Hanrot, Damien Stehlé |
Improved Analysis of Kannan's Shortest Lattice Vector Algorithm. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner |
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Chernoff-Type Direct Product Theorems. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dominique Unruh |
Random Oracles and Auxiliary Input. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
auxiliary input, proof techniques, Random oracles, foundations |
1 | Aggelos Kiayias, Serdar Pehlivanoglu |
Pirate Evolution: How to Make the Most of Your Traitor Keys. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Ronald L. Rivest, Madhu Sudan 0001, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee |
Amplifying Collision Resistance: A Complexity-Theoretic Treatment. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
hash functions, combiners, collision resistance, hardness amplification |
1 | Omer Horvitz, Jonathan Katz |
Universally-Composable Two-Party Computation in Two Rounds. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Alfred Menezes (eds.) |
Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal |
Reducing Trust in the PKG in Identity Based Cryptosystems. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Melissa Chase, Anna Lysyanskaya |
Simulatable VRFs with Applications to Multi-theorem NIZK. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron |
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Coppersmith’s theorem, cryptanalysis, lattice reduction |
1 | Benny Applebaum, Yuval Ishai, Eyal Kushilevitz |
Cryptography with Constant Input Locality. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
1 | Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner |
Secure Identification and QKD in the Bounded-Quantum-Storage Model. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Anja Lehmann |
Security-Amplifying Combiners for Collision-Resistant Hash Functions. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Daniel R. L. Brown, Kristian Gjøsteen |
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptography, Random Number Generation |
1 | Ross J. Anderson, Tyler Moore 0001 |
Information Security Economics - and Beyond. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Danny Harnik, Yuval Ishai, Eyal Kushilevitz |
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation? |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth, Rafail Ostrovsky |
Cryptography in the Multi-string Model. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Common random string model, multi-string model, universally composable commitment, multi-party computation, non-interactive zero-knowledge |
1 | Mihir Bellare, Alexandra Boldyreva, Adam O'Neill |
Deterministic and Efficiently Searchable Encryption. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Nick Howgrave-Graham |
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb |
How Should We Solve Search Problems Privately? |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Jesper Buus Nielsen |
Scalable and Unconditionally Secure Multiparty Computation. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
On Secure Multi-party Computation in Black-Box Groups. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group |
1 | Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern |
Practical Cryptanalysis of SFLASH. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III |
Public Key Encryption That Allows PIR Queries. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data |
1 | Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi |
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Protocol Security, Provable Scurity, Computational Soundness, Diffie-Hellman Assumptions |
1 | Shai Halevi |
Invertible Universal Hashing and the TET Encryption Mode. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Prabhakaran 0001, Mike Rosulek |
Rerandomizable RCCA Encryption. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Joux, Thomas Peyrin |
Hash Functions and the (Amplified) Boomerang Attack. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
hash functions, SHA-1, boomerang attack |
1 | Dennis Hofheinz, Eike Kiltz |
Secure Hybrid Encryption from Weakened Key Encapsulation. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ellen Jochemsz, Alexander May 0001 |
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT |
1 | Ueli M. Maurer, Stefano Tessaro |
Domain Extension of Public Random Functions: Beyond the Birthday Barrier. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner |
Indistinguishability Amplification. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan |
A Method for Making Password-Based Key Exchange Resilient to Server Compromise. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Moni Naor, Gil Segev 0001, Adam D. Smith |
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam D. Smith |
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Louis Granboulan, Antoine Joux, Jacques Stern |
Inverting HFE Is Quasipolynomial. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet |
On the Higher Order Nonlinearities of Algebraic Immune Functions. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
higher order nonlinearity, Boolean function, stream cipher, block cipher, algebraic attack, algebraic immunity, algebraic degree |
1 | Shai Halevi, Hugo Krawczyk |
Strengthening Digital Signatures Via Randomized Hashing. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen, Brent Waters |
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ronen Gradwohl, Salil P. Vadhan, David Zuckerman |
Random Selection with an Adversarial Majority. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Dziembowski |
On Forward-Secure Storage. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen |
Rankin's Constant and Blockwise Lattice Reduction. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin |
Round-Optimal Composable Blind Signatures in the Common Reference String Model. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Chiu-Yuen Koo |
On Expected Constant-Round Protocols for Byzantine Agreement. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Blanchet, David Pointcheval |
Automated Security Proofs with Sequences of Games. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Saurabh Agarwal, Ronald Cramer, Robbert de Haan |
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kamalika Chaudhuri, Nina Mishra |
When Random Sampling Preserves Privacy. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Remo Meier, Bartosz Przydatek |
On Robust Combiners for Private Information Retrieval and Other Primitives. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Joux, Reynald Lercier, Nigel P. Smart, Frederik Vercauteren |
The Number Field Sieve in the Medium Prime Case. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Shai Halevi, Michael Steiner 0001 |
Mitigating Dictionary Attacks on Password-Protected Local Storage. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Oded Regev 0001 |
Lattice-Based Cryptography. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner |
Oblivious Transfer and Linear Functions. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Yuval Ishai |
Scalable Secure Multiparty Computation. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
Non-interactive Zero-knowledge Proofs, Public-key Encryption, Semantic Security, Non-malleability |
1 | Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank |
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zulfikar Ramzan, David P. Woodruff |
Fast Algorithms for the Free Riders Problem in Broadcast Encryption. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hao Chen 0095, Ronald Cramer |
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Iftach Haitner, Danny Harnik, Omer Reingold |
On the Power of the Randomized Iterate. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Melissa Chase, Anna Lysyanskaya |
On Signatures of Knowledge. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Tal Moran, Moni Naor |
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without collision-resistance. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Dwork (eds.) |
Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Elad Barkan, Eli Biham, Adi Shamir |
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
Time/memory tradeoff, time/memory/data tradeoff, hidden state, stateful random graph, Hellman, lower bound, Cryptanalysis, rigorous, Rainbow |
1 | Martin Hirt, Jesper Buus Nielsen |
Robust Multiparty Computation with Linear Communication Complexity. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Xavier Boyen |
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Anna Lysyanskaya, Nikos Triandopoulos |
Rationality and Adversarial Behavior in Multi-party Computation. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Charles Faugère, Ludovic Perret |
Cryptanalysis of 2R- Schemes. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
Functional Decomposition Problem (FDP), Gröbner bases, Cryptanalysis, F5 algorithm |
1 | Jens Groth, Rafail Ostrovsky, Amit Sahai |
Non-interactive Zaps and New Techniques for NIZK. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David A. Wagner 0001 |
Cryptographic Protocols for Electronic Voting. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Victor Shoup (eds.) |
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Lea Kissner, Dawn Xiaodong Song |
Privacy-Preserving Set Operations. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jung Yeon Hwang, Dong Hoon Lee 0001, Jongin Lim 0001 |
Generic Transformation for Scalable Broadcast Encryption Schemes. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway |
Improved Security Analyses for CBC MACs. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
Secure Communications over Insecure Channels Based on Short Authenticated Strings. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Yuval Ishai |
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Abhi Shelat |
Unconditional Characterizations of Non-interactive Zero-Knowledge. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer, Serge Fehr, Martijn Stam |
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Holenstein, Renato Renner |
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov |
A Practical Attack on a Braid Group Based Cryptographic Protocol. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ari Juels, Stephen A. Weis |
Authenticating Pervasive Devices with Human Protocols. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyun Wang 0001, Hongbo Yu, Yiqun Lisa Yin |
Efficient Collision Search Attacks on SHA-0. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
Collision search attacks, Hash functions, SHA-1, SHA-0 |
1 | Yi Lu 0002, Willi Meier, Serge Vaudenay |
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
E0, Stream Ciphers, Bluetooth, Correlation |
1 | Stefan Wolf 0001, Jürg Wullschleger |
New Monotones and Lower Bounds in Unconditional Two-Party Computation. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Dwork, Moni Naor, Hoeteck Wee |
Pebbling and Proofs of Work. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró |
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Anna Lysyanskaya |
A Formal Treatment of Onion Routing. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joël Alwen, Giuseppe Persiano, Ivan Visconti |
Impossibility and Feasibility Results for Zero Knowledge with Public Keys. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin |
Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Robert Granger, Frederik Vercauteren |
On the Discrete Logarithm Problem on Algebraic Tori. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|