default search action
9. PKC 2006: New York, NY, USA
- Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin:
Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Lecture Notes in Computer Science 3958, Springer 2006, ISBN 3-540-33851-9
Cryptanalysis and Protocol Weaknesses
- Daniel Bleichenbacher, Alexander May:
New Attacks on RSA with Small Secret CRT-Exponents. 1-13 - Christian Wieschebrink:
An Attack on a Modified Niederreiter Encryption Scheme. 14-26 - Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern:
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. 27-43
Distributed Crypto-computing
- Payman Mohassel, Matthew K. Franklin:
Efficient Polynomial Operations in the Shared-Coefficients Setting. 44-57 - Chris Crutchfield, David Molnar, David Turner, David A. Wagner:
Generic On-Line/Off-Line Threshold Signatures. 58-74 - Ivan Damgård, Rune Thorbek:
Linear Integer Secret Sharing and Distributed Exponentiation. 75-90
Encryption Methods
- Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval:
Encoding-Free ElGamal Encryption Without Random Oracles. 91-104 - Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai:
Parallel Key-Insulated Public Key Encryption. 105-122 - Anna Lysyanskaya, Mira Meyerovich:
Provably Secure Steganography with Imperfect Sampling. 123-139
Cryptographic Hash and Applications
- Ilya Mironov:
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. 140-156 - Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. 157-173
Number Theory Algorithms
- An Commeine, Igor A. Semaev:
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve. 174-190 - Christophe Doche, Thomas Icart, David R. Kohel:
Efficient Scalar Multiplication by Isogeny Decompositions. 191-206 - Daniel J. Bernstein:
Curve25519: New Diffie-Hellman Speed Records. 207-228
Pairing-Based Cryptography
- Dan Boneh, Emily Shen, Brent Waters:
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. 229-240 - Sanjit Chatterjee, Palash Sarkar:
Generalization of the Selective-ID Security Model for HIBE Protocols. 241-256 - Craig Gentry, Zulfikar Ramzan:
Identity-Based Aggregate Signatures. 257-273 - Eike Kiltz:
On the Limitations of the Spread of an IBE-to-PKE Transformation. 274-289
Cryptosystems Design and Analysis
- Jintai Ding, Jason E. Gower:
Inoculating Multivariate Schemes Against Differential Attacks. 290-301 - Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov:
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol. 302-314 - Frédéric Muller, Frédéric Valette:
High-Order Attacks Against the Exponent Splitting Protection. 315-329
Signature and Identification
- Kaoru Kurosawa, Katja Schmidt-Samoa:
New Online/Offline Signature Schemes Without Random Oracles. 330-346 - Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang:
Anonymous Signature Schemes. 347-363 - Kaoru Kurosawa, Swee-Huay Heng:
The Power of Identification Schemes. 364-377
Authentication and Key Establishment
- Kristin E. Lauter, Anton Mityagin:
Security Analysis of KEA Authenticated Key Exchange Protocol. 378-394 - Sylvain Pasini, Serge Vaudenay:
SAS-Based Authenticated Key Agreement. 395-409 - Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval:
The Twist-AUgmented Technique for Key Exchange. 410-426 - Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval:
Password-Based Group Key Exchange in a Constant Number of Rounds. 427-442
Multi-party Computation
- Cheng-Kang Chu, Wen-Guey Tzeng:
Conditional Oblivious Cast. 443-457 - Payman Mohassel, Matthew K. Franklin:
Efficiency Tradeoffs for Malicious Two-Party Computation. 458-473
PKI Techniques
- Benoît Libert, Jean-Jacques Quisquater:
On Constructing Certificateless Cryptosystems from Identity Based Encryption. 474-490 - Tor E. Bjørstad, Alexander W. Dent:
Building Better Signcryption Schemes with Tag-KEMs. 491-507 - Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto:
Security-Mediated Certificateless Cryptography. 508-524 - Isamu Teranishi, Kazue Sako:
k-Times Anonymous Authentication with a Constant Proving Cost. 525-542
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.