Advances in Cryptology – EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings /

These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Da...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Cramer, Ronald (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3494
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptanalysis I
  • Cryptanalysis of the Hash Functions MD4 and RIPEMD
  • How to Break MD5 and Other Hash Functions
  • Collisions of SHA-0 and Reduced SHA-1
  • Theory I
  • Reducing Complexity Assumptions for Statistically-Hiding Commitment
  • Smooth Projective Hashing and Two-Message Oblivious Transfer
  • On Robust Combiners for Oblivious Transfer and Other Primitives
  • Encryption I
  • Efficient Identity-Based Encryption Without Random Oracles
  • Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
  • Signatures and Authentication
  • Secure Remote Authentication Using Biometric Data
  • Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
  • 3-Move Undeniable Signature Scheme
  • Group Signatures with Efficient Concurrent Join
  • Algebra and Number Theory I
  • Floating-Point LLL Revisited
  • Practical Cryptography in High Dimensional Tori
  • A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
  • Quantum Cryptography
  • Computational Indistinguishability Between Quantum States and Its Cryptographic Application
  • Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
  • Secure Protocols
  • Compact E-Cash
  • Cryptographic Asynchronous Multi-party Computation with Optimal Resilience
  • Algebra and Number Theory II
  • Differential Cryptanalysis for Multivariate Schemes
  • A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
  • Partial Key Exposure Attacks on RSA up to Full Size Exponents
  • The RSA Group is Pseudo-Free
  • Theory II
  • Universally Composable Password-Based Key Exchange
  • Mercurial Commitments with Applications to Zero-Knowledge Sets
  • Encryption II
  • Hierarchical Identity Based Encryption with Constant Size Ciphertext
  • Fuzzy Identity-Based Encryption
  • Cryptanalysis II
  • Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
  • Predicting and Distinguishing Attacks on RC4 Keystream Generator
  • Related-Key Boomerang and Rectangle Attacks
  • On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
  • Broadcast Encryption and Traitor Tracing
  • Public Traceability in Traitor Tracing Schemes
  • One-Way Chain Based Broadcast Encryption Schemes.