Conferences in DBLP
Jung Hee Cheon Security Analysis of the Strong Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:1-11 [Conf ] Kenneth G. Paterson , Arnold K. L. Yau Cryptography in Theory and Practice: The Case of Encryption in IPsec. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:12-29 [Conf ] Jean-Charles Faugère , Ludovic Perret Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:30-47 [Conf ] Vanessa Gratzer , David Naccache Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:48-58 [Conf ] Ee-Chien Chang , Qiming Li Hiding Secret Points Amidst Chaff. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:59-72 [Conf ] Jonathan Katz , Ji Sun Shin Parallel and Concurrent Security of the HB and HB+ Protocols. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:73-87 [Conf ] Tal Moran , Moni Naor Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:88-108 [Conf ] Côme Berbain , Henri Gilbert , Jacques Patarin QUAD: A Practical Stream Cipher with Provable Security. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:109-128 [Conf ] Aline Gouget , Hervé Sibert How to Strengthen Pseudo-random Generators by Using Compression. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:129-146 [Conf ] Frederik Armknecht , Claude Carlet , Philippe Gaborit , Simon Künzli 0002 , Willi Meier , Olivier Ruatta Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:147-164 [Conf ] Scott Contini , Arjen K. Lenstra , Ron Steinfeld VSH, an Efficient and Provable Collision-Resistant Hash Function. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:165-182 [Conf ] John Kelsey , Tadayoshi Kohno Herding Hash Functions and the Nostradamus Attack. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:183-200 [Conf ] Claude Crépeau , George Savvides Optimal Reductions Between Oblivious Transfers Using Interactive Hashing. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:201-221 [Conf ] Stefan Wolf , Jürg Wullschleger Oblivious Transfer Is Symmetric. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:222-232 [Conf ] Nicolas Gama , Nick Howgrave-Graham , Phong Q. Nguyen Symplectic Lattice Reduction and NTRU. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:233-253 [Conf ] Antoine Joux , Reynald Lercier The Function Field Sieve in the Medium Prime Case. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:254-270 [Conf ] Phong Q. Nguyen , Oded Regev Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:271-288 [Conf ] Alexander W. Dent The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:289-307 [Conf ] Yuval Ishai , Manoj Prabhakaran , Amit Sahai , David Wagner Private Circuits II: Keeping Secrets in Tamperable Circuits. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:308-327 [Conf ] Krzysztof Pietrzak Composition Implies Adaptive Security in Minicrypt. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:328-338 [Conf ] Jens Groth , Rafail Ostrovsky , Amit Sahai Perfect Non-interactive Zero Knowledge for NP. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:339-358 [Conf ] Kevin S. McCurley Language Modeling and Encryption on Packet Switched Networks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:359-372 [Conf ] Phillip Rogaway , Thomas Shrimpton A Provable-Security Treatment of the Key-Wrap Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:373-390 [Conf ] Ueli M. Maurer , Yvonne Anne Oswald , Krzysztof Pietrzak , Johan Sjödin Luby-Rackoff Ciphers from Weak Round Functions? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:391-408 [Conf ] Mihir Bellare , Phillip Rogaway The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:409-426 [Conf ] Xavier Boyen , Brent Waters Compact Group Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:427-444 [Conf ] Craig Gentry Practical Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:445-464 [Conf ] Steve Lu , Rafail Ostrovsky , Amit Sahai , Hovav Shacham , Brent Waters Sequential Aggregate Signatures and Multisignatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:465-485 [Conf ] Cynthia Dwork , Krishnaram Kenthapadi , Frank McSherry , Ilya Mironov , Moni Naor Our Data, Ourselves: Privacy Via Distributed Noise Generation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:486-503 [Conf ] Dennis Hofheinz , Jörn Müller-Quade , Dominique Unruh On the (Im-)Possibility of Extending Coin Toss. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:504-521 [Conf ] Berry Schoenmakers , Pim Tuyls Efficient Binary Conversion for Paillier Encrypted Values. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:522-537 [Conf ] Claude Crépeau , George Savvides , Christian Schaffner , Jürg Wullschleger Information-Theoretic Conditions for Two-Party Secure Function Evaluation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:538-554 [Conf ] Ivan Damgård , Kasper Dupont , Michael Østergaard Pedersen Unclonable Group Identification. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:555-572 [Conf ] Dan Boneh , Amit Sahai , Brent Waters Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:573-592 [Conf ] Jesús F. Almansa , Ivan Damgård , Jesper Buus Nielsen Simplified Threshold RSA with Adaptive and Proactive Security. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:593-611 [Conf ]