Cryptographers' World
 

EUROCRYPT 2007


[Sort by page number] [Sort by citations count]

 
Moni Naor, editor, Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings. Springer, 2007. ISBN 3-540-72539-3.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Marc Stevens,  Arjen K. Lenstra,  Benjamin M. M. de Weger,  Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities, pp. 1 - 22, EUROCRYPT 2007.

[Electronic Edition][Cited 65 times Red Star]

Krzysztof Pietrzak,  Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist, pp. 23 - 33, EUROCRYPT 2007.

[Electronic Edition][Cited 15 times ]

John P. Steinberger,  The Collision Intractability of MDC-2 in the Ideal-Cipher Model, pp. 34 - 51, EUROCRYPT 2007.

[Electronic Edition][Cited 26 times ]

Yehuda Lindell,  Benny Pinkas,  An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries, pp. 52 - 78, EUROCRYPT 2007.

[Electronic Edition][Cited 68 times Red Star]

David P. Woodruff,  Revisiting the Efficiency of Malicious Two-Party Computation, pp. 79 - 96, EUROCRYPT 2007.

[Electronic Edition][Cited 16 times ]

Stanislaw Jarecki,  Vitaly Shmatikov,  Efficient Two-Party Secure Computation on Committed Inputs, pp. 97 - 114, EUROCRYPT 2007.

[Electronic Edition][Cited 47 times ]

Jonathan Katz,  Universally Composable Multi-party Computation Using Tamper-Proof Hardware, pp. 115 - 128, EUROCRYPT 2007.

[Electronic Edition][Cited 39 times ]

Moti Yung,  Yunlei Zhao,  Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model, pp. 129 - 147, EUROCRYPT 2007.

[Electronic Edition][Cited 9 times ]

Yi Deng,  Dongdai Lin,  Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability, pp. 148 - 168, EUROCRYPT 2007.

[Electronic Edition][Cited 6 times ]

Chun-Yuan Hsiao,  Chi-Jen Lu,  Leonid Reyzin,  Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility, pp. 169 - 186, EUROCRYPT 2007.

[Electronic Edition][Cited 9 times ]

Shien Jin Ong,  Salil P. Vadhan,  Zero Knowledge and Soundness Are Symmetric, pp. 187 - 209, EUROCRYPT 2007.

[Electronic Edition][Cited 13 times ]

Xavier Boyen,  Mesh Signatures, pp. 210 - 227, EUROCRYPT 2007.

[Electronic Edition][Cited 16 times ]

Thomas Ristenpart,  Scott Yilek,  The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks, pp. 228 - 245, EUROCRYPT 2007.

[Electronic Edition][Cited 22 times ]

Jan Camenisch,  Susan Hohenberger,  Michael √ėstergaard Pedersen,  Batch Verification of Short Signatures, pp. 246 - 263, EUROCRYPT 2007.

[Electronic Edition][Cited 45 times ]

Vivien Dubois,  Pierre-Alain Fouque,  Jacques Stern,  Cryptanalysis of SFLASH with Slightly Modified Parameters, pp. 264 - 275, EUROCRYPT 2007.

[Electronic Edition][Cited 28 times ]

Hongjun Wu,  Bart Preneel,  Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy, pp. 276 - 290, EUROCRYPT 2007.

[Electronic Edition][Cited 10 times ]

Hao Chen,  Ronald Cramer,  Shafi Goldwasser,  Robbert de Haan,  Vinod Vaikuntanathan,  Secure Computation from Random Error Correcting Codes, pp. 291 - 310, EUROCRYPT 2007.

[Electronic Edition][Cited 14 times ]

Jonathan Katz,  Chiu-Yuen Koo,  Round-Efficient Secure Computation in Point-to-Point Networks, pp. 311 - 328, EUROCRYPT 2007.

[Electronic Edition][Cited 16 times ]

Ronald Cramer,  Ivan Damgard,  Robbert de Haan,  Atomic Secure Multi-party Multiplication with Low Communication, pp. 329 - 346, EUROCRYPT 2007.

[Electronic Edition][Cited 5 times ]

Lorenz Minder,  Amin Shokrollahi,  Cryptanalysis of the Sidelnikov Cryptosystem, pp. 347 - 360, EUROCRYPT 2007.

[Electronic Edition][Cited 7 times ]

Aur√©lie Bauer,  Antoine Joux,  Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables, pp. 361 - 378, EUROCRYPT 2007.

[Electronic Edition][Cited 11 times ]

Andreas Enge,  Pierrick Gaudry,  An L (1/3 + epsilon ) Algorithm for the Discrete Logarithm Problem for Low Degree Curves, pp. 379 - 393, EUROCRYPT 2007.

[Electronic Edition][Cited 6 times ]

Xavier Boyen,  General Ad Hoc Encryption from Exponent Inversion IBE, pp. 394 - 411, EUROCRYPT 2007.

[Electronic Edition][Cited 24 times ]

Ivan Damgard,  Rune Thorbek,  Non-interactive Proofs for Integer Multiplication, pp. 412 - 429, EUROCRYPT 2007.

[Electronic Edition][Cited 13 times ]

Robert Granger,  Florian Hess,  Roger Oyono,  Nicolas Th√©riault,  Frederik Vercauteren,  Ate Pairing on Hyperelliptic Curves, pp. 430 - 447, EUROCRYPT 2007.

[Electronic Edition][Cited 31 times ]

Oriol Farr√†s,  Jaume Mart√≠-Farr√©,  Carles Padr√≥,  Ideal Multipartite Secret Sharing Schemes, pp. 448 - 465, EUROCRYPT 2007.

[Electronic Edition][Cited 16 times ]

Willi Geiselmann,  Rainer Steinwandt,  Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit, pp. 466 - 481, EUROCRYPT 2007.

[Electronic Edition][Cited 5 times ]

S√©bastien Canard,  Aline Gouget,  Divisible E-Cash Systems Can Be Truly Anonymous, pp. 482 - 497, EUROCRYPT 2007.

[Electronic Edition][Cited 24 times ]

Ueli M. Maurer,  Johan Sj√∂din,  A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security, pp. 498 - 516, EUROCRYPT 2007.

[Electronic Edition][Cited 9 times ]

Krzysztof Pietrzak,  Johan Sj√∂din,  Range Extension for Weak PRFs; The Good, the Bad, and the Ugly, pp. 517 - 533, EUROCRYPT 2007.

[Electronic Edition][Cited 8 times ]

Yevgeniy Dodis,  Prashant Puniya,  Feistel Networks Made Public, and Applications, pp. 534 - 554, EUROCRYPT 2007.

[Electronic Edition][Cited 14 times ]

J√ľrg Wullschleger,  Oblivious-Transfer Amplification, pp. 555 - 572, EUROCRYPT 2007.

[Electronic Edition][Cited 46 times ]

Jan Camenisch,  Gregory Neven,  Abhi Shelat,  Simulatable Adaptive Oblivious Transfer, pp. 573 - 590, EUROCRYPT 2007.

[Electronic Edition][Cited 68 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...