Conferences in DBLP
Marc Stevens , Arjen K. Lenstra , Benne de Weger Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:1-22 [Conf ] Krzysztof Pietrzak Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:23-33 [Conf ] John P. Steinberger The Collision Intractability of MDC-2 in the Ideal-Cipher Model. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:34-51 [Conf ] Yehuda Lindell , Benny Pinkas An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:52-78 [Conf ] David P. Woodruff Revisiting the Efficiency of Malicious Two-Party Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:79-96 [Conf ] Stanislaw Jarecki , Vitaly Shmatikov Efficient Two-Party Secure Computation on Committed Inputs. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:97-114 [Conf ] Jonathan Katz Universally Composable Multi-party Computation Using Tamper-Proof Hardware. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:115-128 [Conf ] Moti Yung , Yunlei Zhao Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:129-147 [Conf ] Yi Deng , Dongdai Lin Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:148-168 [Conf ] Chun-Yuan Hsiao , Chi-Jen Lu , Leonid Reyzin Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:169-186 [Conf ] Shien Jin Ong , Salil P. Vadhan Zero Knowledge and Soundness Are Symmetric. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:187-209 [Conf ] Xavier Boyen Mesh Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:210-227 [Conf ] Thomas Ristenpart , Scott Yilek The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:228-245 [Conf ] Jan Camenisch , Susan Hohenberger , Michael Østergaard Pedersen Batch Verification of Short Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:246-263 [Conf ] Vivien Dubois , Pierre-Alain Fouque , Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:264-275 [Conf ] Hongjun Wu , Bart Preneel Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:276-290 [Conf ] Hao Chen , Ronald Cramer , Shafi Goldwasser , Robbert de Haan , Vinod Vaikuntanathan Secure Computation from Random Error Correcting Codes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:291-310 [Conf ] Jonathan Katz , Chiu-Yuen Koo Round-Efficient Secure Computation in Point-to-Point Networks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:311-328 [Conf ] Ronald Cramer , Ivan Damgård , Robbert de Haan Atomic Secure Multi-party Multiplication with Low Communication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:329-346 [Conf ] Lorenz Minder , Amin Shokrollahi Cryptanalysis of the Sidelnikov Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:347-360 [Conf ] Aurélie Bauer , Antoine Joux Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:361-378 [Conf ] Andreas Enge , Pierrick Gaudry An L (1/3 + epsilon ) Algorithm for the Discrete Logarithm Problem for Low Degree Curves. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:379-393 [Conf ] Xavier Boyen General Ad Hoc Encryption from Exponent Inversion IBE. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:394-411 [Conf ] Ivan Damgård , Rune Thorbek Non-interactive Proofs for Integer Multiplication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:412-429 [Conf ] Robert Granger , Florian Hess , Roger Oyono , Nicolas Thériault , Frederik Vercauteren Ate Pairing on Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:430-447 [Conf ] Oriol Farràs , Jaume Martí-Farré , Carles Padró Ideal Multipartite Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:448-465 [Conf ] Willi Geiselmann , Rainer Steinwandt Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:466-481 [Conf ] Sébastien Canard , Aline Gouget Divisible E-Cash Systems Can Be Truly Anonymous. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:482-497 [Conf ] Ueli M. Maurer , Johan Sjödin A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:498-516 [Conf ] Krzysztof Pietrzak , Johan Sjödin Range Extension for Weak PRFs; The Good, the Bad, and the Ugly. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:517-533 [Conf ] Yevgeniy Dodis , Prashant Puniya Feistel Networks Made Public, and Applications. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:534-554 [Conf ] Jürg Wullschleger Oblivious-Transfer Amplification. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:555-572 [Conf ] Jan Camenisch , Gregory Neven , Abhi Shelat Simulatable Adaptive Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:573-590 [Conf ]