The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
2007 (conf/eurocrypt/2007)

  1. Marc Stevens, Arjen K. Lenstra, Benne de Weger
    Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:1-22 [Conf]
  2. Krzysztof Pietrzak
    Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:23-33 [Conf]
  3. John P. Steinberger
    The Collision Intractability of MDC-2 in the Ideal-Cipher Model. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:34-51 [Conf]
  4. Yehuda Lindell, Benny Pinkas
    An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:52-78 [Conf]
  5. David P. Woodruff
    Revisiting the Efficiency of Malicious Two-Party Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:79-96 [Conf]
  6. Stanislaw Jarecki, Vitaly Shmatikov
    Efficient Two-Party Secure Computation on Committed Inputs. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:97-114 [Conf]
  7. Jonathan Katz
    Universally Composable Multi-party Computation Using Tamper-Proof Hardware. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:115-128 [Conf]
  8. Moti Yung, Yunlei Zhao
    Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:129-147 [Conf]
  9. Yi Deng, Dongdai Lin
    Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:148-168 [Conf]
  10. Chun-Yuan Hsiao, Chi-Jen Lu, Leonid Reyzin
    Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:169-186 [Conf]
  11. Shien Jin Ong, Salil P. Vadhan
    Zero Knowledge and Soundness Are Symmetric. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:187-209 [Conf]
  12. Xavier Boyen
    Mesh Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:210-227 [Conf]
  13. Thomas Ristenpart, Scott Yilek
    The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:228-245 [Conf]
  14. Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen
    Batch Verification of Short Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:246-263 [Conf]
  15. Vivien Dubois, Pierre-Alain Fouque, Jacques Stern
    Cryptanalysis of SFLASH with Slightly Modified Parameters. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:264-275 [Conf]
  16. Hongjun Wu, Bart Preneel
    Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:276-290 [Conf]
  17. Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan
    Secure Computation from Random Error Correcting Codes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:291-310 [Conf]
  18. Jonathan Katz, Chiu-Yuen Koo
    Round-Efficient Secure Computation in Point-to-Point Networks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:311-328 [Conf]
  19. Ronald Cramer, Ivan Damgård, Robbert de Haan
    Atomic Secure Multi-party Multiplication with Low Communication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:329-346 [Conf]
  20. Lorenz Minder, Amin Shokrollahi
    Cryptanalysis of the Sidelnikov Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:347-360 [Conf]
  21. Aurélie Bauer, Antoine Joux
    Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:361-378 [Conf]
  22. Andreas Enge, Pierrick Gaudry
    An L (1/3 + epsilon ) Algorithm for the Discrete Logarithm Problem for Low Degree Curves. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:379-393 [Conf]
  23. Xavier Boyen
    General Ad Hoc Encryption from Exponent Inversion IBE. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:394-411 [Conf]
  24. Ivan Damgård, Rune Thorbek
    Non-interactive Proofs for Integer Multiplication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:412-429 [Conf]
  25. Robert Granger, Florian Hess, Roger Oyono, Nicolas Thériault, Frederik Vercauteren
    Ate Pairing on Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:430-447 [Conf]
  26. Oriol Farràs, Jaume Martí-Farré, Carles Padró
    Ideal Multipartite Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:448-465 [Conf]
  27. Willi Geiselmann, Rainer Steinwandt
    Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:466-481 [Conf]
  28. Sébastien Canard, Aline Gouget
    Divisible E-Cash Systems Can Be Truly Anonymous. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:482-497 [Conf]
  29. Ueli M. Maurer, Johan Sjödin
    A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:498-516 [Conf]
  30. Krzysztof Pietrzak, Johan Sjödin
    Range Extension for Weak PRFs; The Good, the Bad, and the Ugly. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:517-533 [Conf]
  31. Yevgeniy Dodis, Prashant Puniya
    Feistel Networks Made Public, and Applications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:534-554 [Conf]
  32. Jürg Wullschleger
    Oblivious-Transfer Amplification. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:555-572 [Conf]
  33. Jan Camenisch, Gregory Neven, Abhi Shelat
    Simulatable Adaptive Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:573-590 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002