What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CRYPTO 2007
Year
Venue
Title
2007
CRYPTO
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
Emmanuel Bresson
Yassine Lakhnech
Laurent Mazaré
Bogdan Warinschi
2007
CRYPTO
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
Nick Howgrave-Graham
2007
CRYPTO
A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra
Ronald Cramer
Eike Kiltz
Carles Padró
2007
CRYPTO
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than <i>N</i> <sup>0.073</sup>
Ellen Jochemsz
Alexander May
2007
CRYPTO
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
Daniel R. L. Brown
Kristian Gjøsteen
2007
CRYPTO
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
Ivan Damgård
Serge Fehr
Renato Renner
Louis Salvail
Christian Schaffner
2007
CRYPTO
Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings
2007
CRYPTO
Amplifying Collision Resistance: A Complexity-Theoretic Treatment
Ran Canetti
Ronald L. Rivest
Madhu Sudan
Luca Trevisan
Salil P. Vadhan
Hoeteck Wee
2007
CRYPTO
Chernoff-Type Direct Product Theorems
Russell Impagliazzo
Ragesh Jaiswal
Valentine Kabanets
2007
CRYPTO
Cryptography in the Multi-string Model
Jens Groth
Rafail Ostrovsky
2007
CRYPTO
Cryptography with Constant Input Locality
★
Best paper
Benny Applebaum
Yuval Ishai
Eyal Kushilevitz
2007
CRYPTO
Deterministic and Efficiently Searchable Encryption
Mihir Bellare
Alexandra Boldyreva
Adam O'Neill
2007
CRYPTO
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
Ueli Maurer
Stefano Tessaro
2007
CRYPTO
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach
Jean-Sébastien Coron
2007
CRYPTO
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Pierre-Alain Fouque
Gaëtan Leurent
Phong Q. Nguyen
2007
CRYPTO
Hash Functions and the (Amplified) Boomerang Attack
Antoine Joux
Thomas Peyrin
2007
CRYPTO
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Danny Harnik
Yuval Ishai
Eyal Kushilevitz
2007
CRYPTO
How Should We Solve Search Problems Privately?
Amos Beimel
Tal Malkin
Kobbi Nissim
Enav Weinreb
2007
CRYPTO
Improved Analysis of Kannan's Shortest Lattice Vector Algorithm
Guillaume Hanrot
Damien Stehlé
2007
CRYPTO
Indistinguishability Amplification
Ueli Maurer
Krzysztof Pietrzak
Renato Renner
2007
CRYPTO
Information Security Economics - and Beyond
★
Invited paper
Ross Anderson
Tyler Moore
2007
CRYPTO
Invertible Universal Hashing and the TET Encryption Mode
Shai Halevi
2007
CRYPTO
Leaking Secrets: Exploring the Chasm Between Strong Algorithms and Strong Systems
★
Invited talk
Paul C. Kocher
2007
CRYPTO
On Secure Multi-party Computation in Black-Box Groups
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Huaxiong Wang
2007
CRYPTO
Pirate Evolution: How to Make the Most of Your Traitor Keys
Aggelos Kiayias
Serdar Pehlivanoglu
2007
CRYPTO
Practical Cryptanalysis of SFLASH
Vivien Dubois
Pierre-Alain Fouque
Adi Shamir
Jacques Stern
2007
CRYPTO
Public Key Encryption That Allows PIR Queries
Dan Boneh
Eyal Kushilevitz
Rafail Ostrovsky
William E. Skeith III
2007
CRYPTO
Random Oracles and Auxiliary Input
Dominique Unruh
2007
CRYPTO
Reducing Trust in the PKG in Identity Based Cryptosystems
Vipul Goyal
2007
CRYPTO
Rerandomizable RCCA Encryption
Manoj Prabhakaran
Mike Rosulek
2007
CRYPTO
Scalable and Unconditionally Secure Multiparty Computation
Ivan Damgård
Jesper Buus Nielsen
2007
CRYPTO
Secure Hybrid Encryption from Weakened Key Encapsulation
Dennis Hofheinz
Eike Kiltz
2007
CRYPTO
Secure Identification and QKD in the Bounded-Quantum-Storage Model
Ivan Damgård
Serge Fehr
Louis Salvail
Christian Schaffner
2007
CRYPTO
Security-Amplifying Combiners for Collision-Resistant Hash Functions
Marc Fischlin
Anja Lehmann
2007
CRYPTO
Simulatable VRFs with Applications to Multi-theorem NIZK
Melissa Chase
Anna Lysyanskaya
2007
CRYPTO
Universally-Composable Two-Party Computation in Two Rounds
Omer Horvitz
Jonathan Katz