| Filename | Size | Update |
|---|
| EUROCRYPT09\A Double-Piped Mode of Operation for MACs | PRFs and PROs Security beyond the Birthday Barrier .pdf |
| ...........\A Leakage-Resilient Mode of Operation .pdf |
| ...........\A New Randomness Extraction Paradigm for Hybrid Encryption .pdf |
| ...........\A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks .pdf |
| ...........\A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks .pdf |
| ...........\Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) .pdf |
| ...........\Asymmetric Group Key Agreement .pdf |
| ...........\back-matter.pdf |
| ...........\Breaking RSA Generically Is Equivalent to Factoring .pdf |
| ...........\Cryptanalysis of MDC-2 .pdf |
| ...........\Cryptanalysis on HMAC NMAC MD5 and MD5 MAC .pdf |
| ...........\Cryptography without (Hardly Any) Secrets .pdf |
| ...........\Cube Attacks on Tweakable Black Box Polynomials .pdf |
| ...........\Double-Base Number System for Multi-scalar Multiplications .pdf |
| ...........\ECM on Graphics Cards .pdf |
| ...........\Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves .pdf |
| ...........\Finding Preimages in Full MD5 Faster Than Exhaustive Search .pdf |
| ...........\front-matter.pdf |
| ...........\Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields .pdf |
| ...........\Key Agreement from Close Secrets over Unsecured Channels.pdf |
| ...........\On Randomizing Hash Functions to Strengthen the Security of Digital Signatures .pdf |
| ...........\On the Portability of Generalized Schnorr Proofs .pdf |
| ...........\On the Security Loss in Cryptographic Reductions .pdf |
| ...........\On the Security of Cryptosystems with Quadratic Decryption The Nicest Cryptanalysis .pdf |
| ...........\On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model .pdf |
| ...........\Optimal Randomness Extraction from a Diffie-Hellman Element .pdf |
| ...........\Order-Preserving Symmetric Encryption .pdf |
| ...........\Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening .pdf |
| ...........\Practical Chosen Ciphertext Secure Encryption from Factoring .pdf |
| ...........\Realizing Hash-and-Sign Signatures under Standard Assumptions .pdf |
| ...........\Resettably Secure Computation .pdf |
| ...........\Salvaging Merkle-Damg_ard for.pdf |
| ...........\Simulation without the Artificial Abort Simplified Proof and Improved Concrete Security for Waters IBE Scheme .pdf |
| ...........\Smashing SQUASH-0 .pdf |
| ...........\Traitors Collaborating in Public Pirates 2.0 .pdf |
| ...........\Verifiable Random Functions from Identity-Based Key Encapsulation .pdf |
| EUROCRYPT09 |