Skip to main content
  • Conference proceedings
  • © 2009

Advances in Cryptology - CRYPTO 2009

29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5677)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (39 papers)

  1. Merkle Puzzles

  2. Cryptography in the Physical World

    1. Position Based Cryptography

      • Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
      Pages 391-407
    2. Improving the Security of Quantum Protocols via Commit-and-Open

      • Ivan DamgÃ¥rd, Serge Fehr, Carolin Lunemann, Louis Salvail, Christian Schaffner
      Pages 408-427
  3. Attacks on Signature Schemes

    1. Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures

      • Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann
      Pages 428-444
    2. How Risky Is the Random-Oracle Model?

      • Gaëtan Leurent, Phong Q. Nguyen
      Pages 445-464
  4. Invited Talk

    1. Abstraction in Cryptography

      • Ueli Maurer
      Pages 465-465
  5. Secret Sharing and Secure Computation

    1. Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field

      • Ignacio Cascudo, Hao Chen, Ronald Cramer, Chaoping Xing
      Pages 466-486
    2. The Round Complexity of Verifiable Secret Sharing Revisited

      • Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan
      Pages 487-504
    3. Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer

      • Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
      Pages 505-523
  6. Cryptography and Game-Theory

    1. Collusion-Free Multiparty Computation in the Mediated Model

      • Joël Alwen, Jonathan Katz, Yehuda Lindell, Giuseppe Persiano, abhi shelat, Ivan Visconti
      Pages 524-540
    2. Privacy-Enhancing Auctions Using Rational Cryptography

      • Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
      Pages 541-558
    3. Utility Dependence in Correct and Fair Rational Secret Sharing

      • Gilad Asharov, Yehuda Lindell
      Pages 559-576
  7. Cryptography and Lattices

    1. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems

      • Benny Applebaum, David Cash, Chris Peikert, Amit Sahai
      Pages 595-618
  8. Cryptographers’ Toolbox

    1. The Group of Signed Quadratic Residues and Applications

      • Dennis Hofheinz, Eike Kiltz
      Pages 637-653
    2. Short and Stateless Signatures from the RSA Assumption

      • Susan Hohenberger, Brent Waters
      Pages 654-670
    3. Smooth Projective Hashing for Conditionally Extractable Commitments

      • Michel Abdalla, Céline Chevalier, David Pointcheval
      Pages 671-689

Other Volumes

  1. Advances in Cryptology - CRYPTO 2009

About this book

This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO 2009, held in Santa Barbara, CA, USA in August 2009. The 38 revised full papers presented were carefully reviewed and selected from 213 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on key leakage, hash-function cryptanalysis, privacy and anonymity, interactive proofs and zero-knowledge, block-cipher cryptanalysis, modes of operation, elliptic curves, cryptographic hardness, merkle puzzles, cryptography in the physical world, attacks on signature schemes, secret sharing and secure computation, cryptography and game-theory, cryptography and lattices, identity-based encryption and cryptographers’ toolbox.

Editors and Affiliations

  • IBM Research, Hawthorne, NY, USA

    Shai Halevi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access