


default search action
EUROCRYPT 2006: St. Petersburg, Russia
- Serge Vaudenay:

Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings. Lecture Notes in Computer Science 4004, Springer 2006, ISBN 3-540-34546-9
Cryptanalysis
- Jung Hee Cheon:

Security Analysis of the Strong Diffie-Hellman Problem. 1-11 - Kenneth G. Paterson, Arnold K. L. Yau:

Cryptography in Theory and Practice: The Case of Encryption in IPsec. 12-29 - Jean-Charles Faugère, Ludovic Perret:

Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. 30-47
Invited Talk I
- Vanessa Gratzer, David Naccache:

Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt. 48-58
Cryptography Meets Humans
- Ee-Chien Chang

, Qiming Li:
Hiding Secret Points Amidst Chaff. 59-72 - Jonathan Katz, Ji Sun Shin:

Parallel and Concurrent Security of the HB and HB+ Protocols. 73-87 - Tal Moran, Moni Naor:

Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol. 88-108
Stream Ciphers
- Côme Berbain, Henri Gilbert, Jacques Patarin:

QUAD: A Practical Stream Cipher with Provable Security. 109-128 - Aline Gouget, Hervé Sibert:

How to Strengthen Pseudo-random Generators by Using Compression. 129-146 - Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli, Willi Meier, Olivier Ruatta:

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. 147-164
Hash Functions
- Scott Contini, Arjen K. Lenstra, Ron Steinfeld:

VSH, an Efficient and Provable Collision-Resistant Hash Function. 165-182 - John Kelsey

, Tadayoshi Kohno:
Herding Hash Functions and the Nostradamus Attack. 183-200
Oblivious Transfer
- Claude Crépeau, George Savvides:

Optimal Reductions Between Oblivious Transfers Using Interactive Hashing. 201-221 - Stefan Wolf

, Jürg Wullschleger:
Oblivious Transfer Is Symmetric. 222-232
Numbers and Lattices
- Nicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen:

Symplectic Lattice Reduction and NTRU. 233-253 - Antoine Joux

, Reynald Lercier:
The Function Field Sieve in the Medium Prime Case. 254-270 - Phong Q. Nguyen, Oded Regev:

Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. 271-288
Foundations
- Alexander W. Dent:

The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model. 289-307 - Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David A. Wagner:

Private Circuits II: Keeping Secrets in Tamperable Circuits. 308-327 - Krzysztof Pietrzak:

Composition Implies Adaptive Security in Minicrypt. 328-338 - Jens Groth, Rafail Ostrovsky, Amit Sahai:

Perfect Non-interactive Zero Knowledge for NP. 339-358
Invited Talk II
- Kevin S. McCurley

:
Language Modeling and Encryption on Packet Switched Networks. 359-372
Block Ciphers
- Phillip Rogaway, Thomas Shrimpton:

A Provable-Security Treatment of the Key-Wrap Problem. 373-390 - Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin:

Luby-Rackoff Ciphers from Weak Round Functions? 391-408 - Mihir Bellare, Phillip Rogaway:

The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. 409-426
Cryptography Without Random Oracles
- Xavier Boyen, Brent Waters:

Compact Group Signatures Without Random Oracles. 427-444 - Craig Gentry:

Practical Identity-Based Encryption Without Random Oracles. 445-464 - Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:

Sequential Aggregate Signatures and Multisignatures Without Random Oracles. 465-485
Multiparty Computation
- Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov

, Moni Naor:
Our Data, Ourselves: Privacy Via Distributed Noise Generation. 486-503 - Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh

:
On the (Im-)Possibility of Extending Coin Toss. 504-521 - Berry Schoenmakers, Pim Tuyls:

Efficient Binary Conversion for Paillier Encrypted Values. 522-537 - Claude Crépeau, George Savvides, Christian Schaffner

, Jürg Wullschleger:
Information-Theoretic Conditions for Two-Party Secure Function Evaluation. 538-554
Cryptography for Groups
- Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen:

Unclonable Group Identification. 555-572 - Dan Boneh, Amit Sahai, Brent Waters:

Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. 573-592 - Jesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen

:
Simplified Threshold RSA with Adaptive and Proactive Security. 593-611

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














