| |
| |
Diffie-Hellman Based Schemes | |
| |
| |
Efficient Construction of (Distributed) Verifiable Random Functions | |
| |
| |
| |
An Identity-Based Signature from Gap Diffie-Hellman Groups | |
| |
| |
| |
Threshold Cryptography | |
| |
| |
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme | |
| |
| |
| |
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack | |
| |
| |
| |
Reduction Proofs | |
| |
| |
On the Bit Security of NTRUEncrypt | |
| |
| |
| |
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks | |
| |
| |
| |
Broadcast and Tracing | |
| |
| |
Randomness Re-use in Multi-recipient Encryption Schemes | |
| |
| |
| |
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack | |
| |
| |
| |
Digital Signatures | |
| |
| |
The Cramer-Shoup Strong-RSA Signature Scheme Revisited | |
| |
| |
| |
Strong Key-Insulated Signature Schemes | |
| |
| |
| |
Specialized Multiparty Cryptography | |
| |
| |
A Verifiable Secret Shuffle of Homomorphic Encryptions | |
| |
| |
| |
Round-Optimal Contributory Conference Key Agreement | |
| |
| |
| |
Cryptanalysis I | |
| |
| |
Security Analysis of the MORCryptosystem | |
| |
| |
| |
A Practical Attack on Some Braid Group Based Cryptographic Primitives | |
| |
| |
| |
Elliptic Curves: Implementation Attacks | |
| |
| |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems | |
| |
| |
| |
Validation of Elliptic Curve Public Keys | |
| |
| |
| |
Exceptional Procedure Attack on Elliptic Curve Cryptosystems | |
| |
| |
| |
Implementation and Hardware Issues | |
| |
| |
On Montgomery-Like Representations for Elliptic Curves over GF(2<sup>k</sup>) | |
| |
| |
| |
A Dedicated Sieving Hardware | |
| |
| |
| |
A Fast and Secure Implementation of Sflash | |
| |
| |
| |
New Public Key Schemes | |
| |
| |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes | |
| |
| |
| |
A Lattice Based Public Key Cryptosystem Using Polynomial Representations | |
| |
| |
| |
Elliptic Curves: General Issues | |
| |
| |
The Security of DSA and ECDSA (Bypassing the Standard Elliptic Curve Certification Scheme) | |
| |
| |
| |
Cryptanalysis II | |
| |
| |
Side-Channel Attacks on Textbook RSA and ElGamal Encryption | |
| |
| |
| |
On the Security of HFE, HFEv- and Quartz | |
| |
| |
| |
Generic Attacks and the Security of Quartz | |
| |
| |
| |
Author Index | |