© 2009

Advances in Cryptology - EUROCRYPT 2009

28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings

  • Antoine Joux
Conference proceedings EUROCRYPT 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5479)

Table of contents

  1. Front Matter
  2. Security, Proofs and Models (1)

    1. Divesh Aggarwal, Ueli Maurer
      Pages 36-53
    2. Vipul Goyal, Amit Sahai
      Pages 54-71
  3. Hash Cryptanalysis

    1. Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen
      Pages 106-120
    2. Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan
      Pages 121-133
    3. Yu Sasaki, Kazumaro Aoki
      Pages 134-152
  4. Group and Broadcast Encryption

    1. Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer
      Pages 153-170
    2. Olivier Billet, Duong Hieu Phan
      Pages 189-205
  5. Cryptosystems (1)

    1. Bhavana Kanukurthi, Leonid Reyzin
      Pages 206-223
    2. Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill
      Pages 224-241
  6. Cryptanalysis

    1. Itai Dinur, Adi Shamir
      Pages 278-299
    2. Khaled Ouafi, Serge Vaudenay
      Pages 300-312
  7. Cryptosystems (2)

    1. Dennis Hofheinz, Eike Kiltz
      Pages 313-332
    2. Susan Hohenberger, Brent Waters
      Pages 333-350

About these proceedings


This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009.

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 148 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on security, proofs, and models, hash cryptanalysis, group and broadcast encryption, cryptosystems, cryptanalysis, side channels, curves, and randomness.


algebraic attacks anonymity authentication block ciphers computational number theory cryptanalysis cryptographic attacks cryptographic hash functions cryptographic protocols cryptographic systems cryptography cryptology data encryption database security

Editors and affiliations

  • Antoine Joux
    • 1
  1. 1.DGA and University of Versailles Saint-Quentin-en-YvelinesVersailles cedexFrance

Bibliographic information