Cryptographers' World
 

CRYPTO 2008


[Sort by page number] [Sort by citations count]

 
David Wagner, editor, Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-85173-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Jean-SĂ©bastien Coron,  Jacques Patarin,  Yannick Seurin,  The Random Oracle Model and the Ideal Cipher Model Are Equivalent, pp. 1 - 20, CRYPTO 2008.

[Electronic Edition][Cited 26 times ]

Dennis Hofheinz,  Eike Kiltz,  Programmable Hash Functions and Their Applications, pp. 21 - 38, CRYPTO 2008.

[Electronic Edition][Cited 18 times ]

Shafi Goldwasser,  Yael Tauman Kalai,  Guy N. Rothblum,  One-Time Programs, pp. 39 - 56, CRYPTO 2008.

[Electronic Edition][Cited 37 times ]

Omkant Pandey,  Rafael Pass,  Vinod Vaikuntanathan,  Adaptive One-Way Functions and Applications, pp. 57 - 74, CRYPTO 2008.

[Electronic Edition][Cited 12 times ]

Dimitar Jetchev,  Ramarathnam Venkatesan,  Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys, pp. 75 - 92, CRYPTO 2008.

[Electronic Edition][Cited 2 times ]

Sanjam Garg,  Raghav Bhaskar,  Satyanarayana V. Lokam,  Improved Bounds on Security Reductions for Discrete Log Based Signatures, pp. 93 - 107, CRYPTO 2008.

[Electronic Edition][Cited 2 times ]

Dan Boneh,  Shai Halevi,  Michael Hamburg,  Rafail Ostrovsky,  Circular-Secure Encryption from Decision Diffie-Hellman, pp. 108 - 125, CRYPTO 2008.

[Electronic Edition][Cited 37 times ]

Brett Hemenway,  Rafail Ostrovsky,  Public-Key Locally-Decodable Codes, pp. 126 - 143, CRYPTO 2008.

[Electronic Edition][Cited 2 times ]

Helena Handschuh,  Bart Preneel,  Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms, pp. 144 - 161, CRYPTO 2008.

[Electronic Edition][Cited 19 times ]

Florian Mendel,  Norbert Pramstaller,  Christian Rechberger,  Marcin Kontak,  Janusz Smit,  Cryptanalysis of the GOST Hash Function, pp. 162 - 178, CRYPTO 2008.

[Electronic Edition][Cited 10 times ]

Christophe De Cannière,  Christian Rechberger,  Preimages for Reduced SHA-0 and SHA-1, pp. 179 - 202, CRYPTO 2008.

[Electronic Edition][Cited 38 times ]

Thomas Eisenbarth,  Timo Kasper,  Amir Moradi,  Christof Paar,  Mahmoud Salmasizadeh,  Mohammad T. Manzuri Shalmani,  On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme, pp. 203 - 220, CRYPTO 2008.

[Electronic Edition][Cited 32 times ]

Eli Biham,  Yaniv Carmeli,  Adi Shamir,  Bug Attacks, pp. 221 - 240, CRYPTO 2008.

[Electronic Edition][Cited 7 times ]

Ivan Damgard,  Yuval Ishai,  Mikkel Krøigaard,  Jesper Buus Nielsen,  Adam Smith,  Scalable Multiparty Computation with Nearly Optimal Work and Resilience, pp. 241 - 261, CRYPTO 2008.

[Electronic Edition][Cited 6 times ]

Manoj Prabhakaran,  Mike Rosulek,  Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations, pp. 262 - 279, CRYPTO 2008.

[Electronic Edition][Cited 10 times ]

Jean-Charles Faugère,  Françoise Levy-dit-Vehel,  Ludovic Perret,  Cryptanalysis of MinRank, pp. 280 - 296, CRYPTO 2008.

[Electronic Edition][Cited 17 times ]

Alexander Maximov,  Dmitry Khovratovich,  New State Recovery Attack on RC4, pp. 297 - 316, CRYPTO 2008.

[Electronic Edition][Cited 10 times ]

CĂ©cile DelerablĂ©e,  David Pointcheval,  Dynamic Threshold Public-Key Encryption, pp. 317 - 334, CRYPTO 2008.

[Electronic Edition][Cited 4 times ]

Alexandra Boldyreva,  Serge Fehr,  Adam O'Neill,  On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles, pp. 335 - 359, CRYPTO 2008.

[Electronic Edition][Cited 36 times ]

Mihir Bellare,  Marc Fischlin,  Adam O'Neill,  Thomas Ristenpart,  Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles, pp. 360 - 378, CRYPTO 2008.

[Electronic Edition][Cited 15 times ]

Rafail Ostrovsky,  William E. Skeith III,  Communication Complexity in Algebraic Two-Party Protocols, pp. 379 - 396, CRYPTO 2008.

[Electronic Edition][Cited 2 times ]

Martijn Stam,  Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions, pp. 397 - 412, CRYPTO 2008.

[Electronic Edition][Cited 21 times ]

Krzysztof Pietrzak,  Compression from Collisions, or Why CRHF Combiners Have a Long Output, pp. 413 - 432, CRYPTO 2008.

[Electronic Edition][Cited 4 times ]

Phillip Rogaway,  John P. Steinberger,  Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers, pp. 433 - 450, CRYPTO 2008.

[Electronic Edition][Cited 29 times ]

Amos Beimel,  Kobbi Nissim,  Eran Omri,  Distributed Private Data Analysis: Simultaneously Solving How and What, pp. 451 - 468, CRYPTO 2008.

[Electronic Edition][Cited 7 times ]

Cynthia Dwork,  Sergey Yekhanin,  New Efficient Attacks on Statistical Disclosure Control Mechanisms, pp. 469 - 480, CRYPTO 2008.

[Electronic Edition][Cited 19 times ]

Payman Mohassel,  Enav Weinreb,  Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries, pp. 481 - 496, CRYPTO 2008.

[Electronic Edition][Cited 5 times ]

JoĂ«l Alwen,  Abhi Shelat,  Ivan Visconti,  Collusion-Free Protocols in the Mediated Model, pp. 497 - 514, CRYPTO 2008.

[Electronic Edition][Cited 4 times ]

Yevgeniy Dodis,  Victor Shoup,  Shabsi Walfish,  Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs, pp. 515 - 535, CRYPTO 2008.

[Electronic Edition][Cited 4 times ]

Chris Peikert,  Vinod Vaikuntanathan,  Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems, pp. 536 - 553, CRYPTO 2008.

[Electronic Edition][Cited 9 times ]

Chris Peikert,  Vinod Vaikuntanathan,  Brent Waters,  A Framework for Efficient and Composable Oblivious Transfer, pp. 554 - 571, CRYPTO 2008.

[Electronic Edition][Cited 94 times Red Star]

Yuval Ishai,  Manoj Prabhakaran,  Amit Sahai,  Founding Cryptography on Oblivious Transfer - Efficiently, pp. 572 - 591, CRYPTO 2008.

[Electronic Edition][Cited 44 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...