Luca Aceto, Ivan Damgård, Leslie Ann Goldberg, Magnús M. Halldórsson, Anna Ingólfsdóttir, Igor Walukiewicz
Proceedings of the 35th International Colloquium on Automata, Languages and Programming, Track C: Security and Cryptography Foundations
ICALP (2), 2008.
@proceedings{ICALP-C-2008,
address = "Reykjavik, Iceland",
editor = "Luca Aceto and Ivan Damgård and Leslie Ann Goldberg and Magnús M. Halldórsson and Anna Ingólfsdóttir and Igor Walukiewicz",
isbn = "978-3-540-70582-6",
publisher = "{Springer International Publishing}",
series = "{Lecture Notes in Computer Science}",
title = "{Proceedings of the 35th International Colloquium on Automata, Languages and Programming, Track C: Security and Cryptography Foundations}",
volume = 5126,
year = 2008,
}
Contents (24 items)
- ICALP-C-2008-PietrzakS #pseudo
- Weak Pseudorandom Functions in Minicrypt (KP, JS), pp. 423–436.
- ICALP-C-2008-AltmannJR #black box #integer #on the
- On Black-Box Ring Extraction and Integer Factorization (KA, TJ, AR), pp. 437–448.
- ICALP-C-2008-CanettiD
- Extractable Perfectly One-Way Functions (RC, RRD), pp. 449–460.
- ICALP-C-2008-PrzydatekW
- Error-Tolerant Combiners for Oblivious Primitives (BP, JW), pp. 461–472.
- ICALP-C-2008-HirtNP #communication #multi #polynomial
- Asynchronous Multi-Party Computation with Quadratic Communication (MH, JBN, BP), pp. 473–485.
- ICALP-C-2008-KolesnikovS
- Improved Garbled Circuit: Free XOR Gates and Applications (VK, TS), pp. 486–498.
- ICALP-C-2008-KatzKK #complexity #network
- Improving the Round Complexity of VSS in Point-to-Point Networks (JK, CYK, RK), pp. 499–510.
- ICALP-C-2008-CanettiEGL #how
- How to Protect Yourself without Perfect Shredding (RC, DE, SG, DYL), pp. 511–523.
- ICALP-C-2008-KurosawaF #composition
- Universally Composable Undeniable Signature (KK, JF), pp. 524–535.
- ICALP-C-2008-KalaiR #interactive
- Interactive PCP (YTK, RR), pp. 536–547.
- ICALP-C-2008-OstrovskyPV #concurrent
- Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model (RO, GP, IV), pp. 548–559.
- ICALP-C-2008-ShiW #encryption
- Delegating Capabilities in Predicate Encryption Systems (ES, BW), pp. 560–578.
- ICALP-C-2008-GoyalJPS #bound #encryption #policy
- Bounded Ciphertext Policy Attribute Based Encryption (VG, AJ, OP, AS), pp. 579–591.
- ICALP-C-2008-HallgrenKSZ #protocol #quantum #verification
- Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks (SH, AK, PS, SZ), pp. 592–603.
- ICALP-C-2008-WehnerW #bound #composition #security
- Composable Security in the Bounded-Quantum-Storage Model (SW, JW), pp. 604–615.
- ICALP-C-2008-HochS #on the
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (JJH, AS), pp. 616–630.
- ICALP-C-2008-NaorSW #independence
- History-Independent Cuckoo Hashing (MN, GS, UW), pp. 631–642.
- ICALP-C-2008-ShrimptonS
- Building a Collision-Resistant Compression Function from Non-compressing Primitives (TS, MS), pp. 643–654.
- ICALP-C-2008-FischlinLP #multi #revisited #robust
- Robust Multi-property Combiners for Hash Functions Revisited (MF, AL, KP), pp. 655–666.
- ICALP-C-2008-PrabhakaranR #encryption #security
- Homomorphic Encryption with CCA Security (MP, MR), pp. 667–678.
- ICALP-C-2008-GilbertRS #how #problem
- How to Encrypt with the LPN Problem (HG, MJBR, YS), pp. 679–690.
- ICALP-C-2008-DingDYCC #question
- Could SFLASH be Repaired? (JD, VD, BYY, CHOC, CMC), pp. 691–701.
- ICALP-C-2008-KolesnikovR #authentication
- Password Mistyping in Two-Factor-Authenticated Key Exchange (VK, CR), pp. 702–714.
- ICALP-C-2008-JareckiL #authentication #multi #performance
- Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials (SJ, XL), pp. 715–726.