Filename | Size | Update |
---|
EUROCRYPT09\A Double-Piped Mode of Operation for MACs | PRFs and PROs Security beyond the Birthday Barrier .pdf |
...........\A Leakage-Resilient Mode of Operation .pdf |
...........\A New Randomness Extraction Paradigm for Hybrid Encryption .pdf |
...........\A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks .pdf |
...........\A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks .pdf |
...........\Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) .pdf |
...........\Asymmetric Group Key Agreement .pdf |
...........\back-matter.pdf |
...........\Breaking RSA Generically Is Equivalent to Factoring .pdf |
...........\Cryptanalysis of MDC-2 .pdf |
...........\Cryptanalysis on HMAC NMAC MD5 and MD5 MAC .pdf |
...........\Cryptography without (Hardly Any) Secrets .pdf |
...........\Cube Attacks on Tweakable Black Box Polynomials .pdf |
...........\Double-Base Number System for Multi-scalar Multiplications .pdf |
...........\ECM on Graphics Cards .pdf |
...........\Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves .pdf |
...........\Finding Preimages in Full MD5 Faster Than Exhaustive Search .pdf |
...........\front-matter.pdf |
...........\Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields .pdf |
...........\Key Agreement from Close Secrets over Unsecured Channels.pdf |
...........\On Randomizing Hash Functions to Strengthen the Security of Digital Signatures .pdf |
...........\On the Portability of Generalized Schnorr Proofs .pdf |
...........\On the Security Loss in Cryptographic Reductions .pdf |
...........\On the Security of Cryptosystems with Quadratic Decryption The Nicest Cryptanalysis .pdf |
...........\On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model .pdf |
...........\Optimal Randomness Extraction from a Diffie-Hellman Element .pdf |
...........\Order-Preserving Symmetric Encryption .pdf |
...........\Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening .pdf |
...........\Practical Chosen Ciphertext Secure Encryption from Factoring .pdf |
...........\Realizing Hash-and-Sign Signatures under Standard Assumptions .pdf |
...........\Resettably Secure Computation .pdf |
...........\Salvaging Merkle-Damg_ard for.pdf |
...........\Simulation without the Artificial Abort Simplified Proof and Improved Concrete Security for Waters IBE Scheme .pdf |
...........\Smashing SQUASH-0 .pdf |
...........\Traitors Collaborating in Public Pirates 2.0 .pdf |
...........\Verifiable Random Functions from Identity-Based Key Encapsulation .pdf |
EUROCRYPT09 |