On the Optimality of Linear, Differential and Sequential Distinguishers
Pascal Junod
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
Alex Biryukov, Christophe De Canniere, An Braeken, and Bart Preneel
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions
Ran Canetti, Eyal Kushilevitz, and Yehuda Lindell
Fair Secure Two-Party Computation
Benny Pinkas
Simulatable Commitments and Efficient Concurrent Zero-Knowledge
Daniele Micciancio and Erez Petrank
Simulation in Quasi-polynomial Time, and its Application to Protocol Composition
Rafael Pass
Strengthening Zero-Knowledge Protocols Using Signatures
Juan Garay, Phil MacKenzie, and Ke Yang
Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications
Jonathan Katz
A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions
Yehuda Lindell
A Forward-Secure Public-Key Encryption Scheme
Ran Canetti, Shai Halevi, and Jonathan Katz
Certificate-Based Encryption and the Certificate Revocation Problem
Craig Gentry
Concealment and its Applications to Authenticated Encryption
Yevgeniy Dodis and Jee Hea An
Algebraic Attacks on Stream Ciphers with Linear Feedback
Nicolas T. Courtois and Willi Meier
The GHS Attack Revisited
Florian Hess
Improved Algorithms for Efficient Arithmetic on Elliptic Curve Using Fast Endomorphisms
Mathieu Ciet, Tanja Lange, Francesco Sica, and Jean-Jacques Quisquater
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham
Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures
Michael Szydlo
Cryptanalysis of the Public-Key Encryption Based on Braid Groups
Eonkyung Lee and Je Hong Park
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
Mihir Bellare and Tadayoshi Kohno
A Framework for Password-Based Authenticated Key Exchange
Rosario Gennaro and Yehuda Lindell
New Bounds in Secret-Key Agreement: The Gap Between Formation and Secrecy Extraction
Renato Renner and Stefan Wolf
Efficient Multi-Party Computation over Rings
Ronald Cramer, Serge Fehr, Yuval Ishai, and Eyal Kushilevitz
Extracting Group Signatures from Traitor Tracing Schemes
Aggelos Kiayias and Moti Yung