Cryptographers' World
 

CRYPTO 2009


[Sort by page number] [Sort by citations count]

 
Shai Halevi, editor, Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings. Springer, 2009. ISBN 978-3-642-03355-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Nadia Heninger,  Hovav Shacham,  Reconstructing RSA Private Keys from Random Key Bits, pp. 1 - 17, CRYPTO 2009.

[Electronic Edition][Cited 9 times ]

Moni Naor,  Gil Segev,  Public-Key Cryptosystems Resilient to Key Leakage, pp. 18 - 35, CRYPTO 2009.

[Electronic Edition][Cited 39 times ]

JoĆ«l Alwen,  Yevgeniy Dodis,  Daniel Wichs,  Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model, pp. 36 - 54, CRYPTO 2009.

[Electronic Edition][Cited 47 times ]

Marc Stevens,  Alexander Sotirov,  Jacob Appelbaum,  Arjen K. Lenstra,  David Molnar,  Dag Arne Osvik,  Benjamin M. M. de Weger,  Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate, pp. 55 - 69, CRYPTO 2009.

[Electronic Edition][Cited 48 times ]

Kazumaro Aoki,  Yu Sasaki,  Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1, pp. 70 - 89, CRYPTO 2009.

[Electronic Edition][Cited 8 times ]

Stanislaw Jarecki,  Xiaomin Liu,  Private Mutual Authentication and Conditional Oblivious Transfer, pp. 90 - 107, CRYPTO 2009.

[Electronic Edition][Cited 4 times ]

Mira Belenkiy,  Jan Camenisch,  Melissa Chase,  Markulf Kohlweiss,  Anna Lysyanskaya,  Hovav Shacham,  Randomizable Proofs and Delegatable Anonymous Credentials, pp. 108 - 125, CRYPTO 2009.

[Electronic Edition][Cited 50 times Red Star]

Ilya Mironov,  Omkant Pandey,  Omer Reingold,  Salil P. Vadhan,  Computational Differential Privacy, pp. 126 - 142, CRYPTO 2009.

[Electronic Edition][Cited 4 times ]

Yael Tauman Kalai,  Ran Raz,  Probabilistically Checkable Arguments, pp. 143 - 159, CRYPTO 2009.

[Electronic Edition][Cited 7 times ]

Rafael Pass,  Wei-Lung Dustin Tseng,  Douglas Wikstrƶm,  On the Composition of Public-Coin Zero-Knowledge Protocols, pp. 160 - 176, CRYPTO 2009.

[Electronic Edition][Cited 5 times ]

Ronald Cramer,  Ivan Damgard,  On the Amortized Complexity of Zero-Knowledge Protocols, pp. 177 - 191, CRYPTO 2009.

[Electronic Edition][Cited 5 times ]

Jens Groth,  Linear Algebra with Sub-linear Zero-Knowledge Arguments, pp. 192 - 208, CRYPTO 2009.

[Electronic Edition][Cited 7 times ]

Zheng Yuan,  Wei Wang,  Keting Jia,  Guangwu Xu,  Xiaoyun Wang,  New Birthday Attacks on Some MACs Based on Block Ciphers, pp. 209 - 230, CRYPTO 2009.

[Electronic Edition][Cited 4 times ]

Alex Biryukov,  Dmitry Khovratovich,  Ivica Nikolic,  Distinguisher and Related-Key Attack on the Full AES-256, pp. 231 - 249, CRYPTO 2009.

[Electronic Edition][Cited 30 times ]

Julia Borghoff,  Lars R. Knudsen,  Gregor Leander,  Krystian Matusiewicz,  Cryptanalysis of C2, pp. 250 - 266, CRYPTO 2009.

[Electronic Edition][Cited 1 times ]

Yevgeniy Dodis,  John P. Steinberger,  Message Authentication Codes from Unpredictable Block Ciphers, pp. 267 - 285, CRYPTO 2009.

[Electronic Edition][Cited 5 times ]

Ben Morris,  Phillip Rogaway,  Till Stegers,  How to Encipher Messages on a Small Domain, pp. 286 - 302, CRYPTO 2009.

[Electronic Edition][Cited 2 times ]

Thomas Icart,  How to Hash into Elliptic Curves, pp. 303 - 316, CRYPTO 2009.

[Electronic Edition][Cited 17 times ]

Daniel J. Bernstein,  Batch Binary Edwards, pp. 317 - 336, CRYPTO 2009.

[Electronic Edition][Cited 11 times ]

Adi Akavia,  Solving Hidden Number Problem with One Bit Oracle and Advice, pp. 337 - 354, CRYPTO 2009.

[Electronic Edition][Cited 1 times ]

Ueli M. Maurer,  Stefano Tessaro,  Computational Indistinguishability Amplification: Tight Product Theorems for System Composition, pp. 355 - 373, CRYPTO 2009.

[Electronic Edition][Cited 10 times ]

Boaz Barak,  Mohammad Mahmoody-Ghidary,  Merkle Puzzles Are Optimal - An , pp. 374 - 390, CRYPTO 2009.

[Electronic Edition][Cited 4 times ]

Nishanth Chandran,  Vipul Goyal,  Ryan Moriarty,  Rafail Ostrovsky,  Position Based Cryptography, pp. 391 - 407, CRYPTO 2009.

[Electronic Edition][Cited 3 times ]

Ivan Damgard,  Serge Fehr,  Carolin Lunemann,  Louis Salvail,  Christian Schaffner,  Improving the Security of Quantum Protocols via Commit-and-Open, pp. 408 - 427, CRYPTO 2009.

[Electronic Edition][Cited 7 times ]

Jean-SĆ©bastien Coron,  David Naccache,  Mehdi Tibouchi,  Ralf-Philipp Weinmann,  Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures, pp. 428 - 444, CRYPTO 2009.

[Electronic Edition][Cited 3 times ]

GaĆ«tan Leurent,  Phong Q. Nguyen,  How Risky Is the Random-Oracle Model?, pp. 445 - 464, CRYPTO 2009.

[Electronic Edition][Cited 11 times ]

Ueli M. Maurer,  Abstraction in Cryptography, pp. 465 - 465, CRYPTO 2009.

[Electronic Edition][Cited 1 times ]

Ignacio Cascudo Pueyo,  Hao Chen,  Ronald Cramer,  Chaoping Xing,  Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over , pp. 466 - 486, CRYPTO 2009.

[Electronic Edition][Cited 2 times ]

Arpita Patra,  Ashish Choudhary,  Tal Rabin,  C. Pandu Rangan,  The Round Complexity of Verifiable Secret Sharing Revisited, pp. 487 - 504, CRYPTO 2009.

[Electronic Edition][Cited 14 times ]

Juan A. Garay,  Daniel Wichs,  Hong-Sheng Zhou,  Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer, pp. 505 - 523, CRYPTO 2009.

[Electronic Edition][Cited 5 times ]

JoĆ«l Alwen,  Jonathan Katz,  Yehuda Lindell,  Giuseppe Persiano,  Abhi Shelat,  Ivan Visconti,  Collusion-Free Multiparty Computation in the Mediated Model, pp. 524 - 540, CRYPTO 2009.

[Electronic Edition][Cited 2 times ]

Peter Bro Miltersen,  Jesper Buus Nielsen,  Nikos Triandopoulos,  Privacy-Enhancing Auctions Using Rational Cryptography, pp. 541 - 558, CRYPTO 2009.

[Electronic Edition][Cited 1 times ]

Gilad Asharov,  Yehuda Lindell,  Utility Dependence in Correct and Fair Rational Secret Sharing, pp. 559 - 576, CRYPTO 2009.

[Electronic Edition][Cited 3 times ]

Vadim Lyubashevsky,  Daniele Micciancio,  On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem, pp. 577 - 594, CRYPTO 2009.

[Electronic Edition][Cited 14 times ]

Benny Applebaum,  David Cash,  Chris Peikert,  Amit Sahai,  Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems, pp. 595 - 618, CRYPTO 2009.

[Electronic Edition][Cited 15 times ]

Brent Waters,  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, pp. 619 - 636, CRYPTO 2009.

[Electronic Edition][Cited 27 times ]

Dennis Hofheinz,  Eike Kiltz,  The Group of Signed Quadratic Residues and Applications, pp. 637 - 653, CRYPTO 2009.

[Electronic Edition][Cited 17 times ]

Susan Hohenberger,  Brent Waters,  Short and Stateless Signatures from the RSA Assumption, pp. 654 - 670, CRYPTO 2009.

[Electronic Edition][Cited 20 times ]

Michel Abdalla,  CĆ©line Chevalier,  David Pointcheval,  Smooth Projective Hashing for Conditionally Extractable Commitments, pp. 671 - 689, CRYPTO 2009.

[Electronic Edition][Cited 4 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...