Advances in Cryptology – EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings /
These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Da...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Series: | Lecture Notes in Computer Science,
3494 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Cryptanalysis I
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Collisions of SHA-0 and Reduced SHA-1
- Theory I
- Reducing Complexity Assumptions for Statistically-Hiding Commitment
- Smooth Projective Hashing and Two-Message Oblivious Transfer
- On Robust Combiners for Oblivious Transfer and Other Primitives
- Encryption I
- Efficient Identity-Based Encryption Without Random Oracles
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Signatures and Authentication
- Secure Remote Authentication Using Biometric Data
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- 3-Move Undeniable Signature Scheme
- Group Signatures with Efficient Concurrent Join
- Algebra and Number Theory I
- Floating-Point LLL Revisited
- Practical Cryptography in High Dimensional Tori
- A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
- Quantum Cryptography
- Computational Indistinguishability Between Quantum States and Its Cryptographic Application
- Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
- Secure Protocols
- Compact E-Cash
- Cryptographic Asynchronous Multi-party Computation with Optimal Resilience
- Algebra and Number Theory II
- Differential Cryptanalysis for Multivariate Schemes
- A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
- Partial Key Exposure Attacks on RSA up to Full Size Exponents
- The RSA Group is Pseudo-Free
- Theory II
- Universally Composable Password-Based Key Exchange
- Mercurial Commitments with Applications to Zero-Knowledge Sets
- Encryption II
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Cryptanalysis II
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Related-Key Boomerang and Rectangle Attacks
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- Broadcast Encryption and Traitor Tracing
- Public Traceability in Traitor Tracing Schemes
- One-Way Chain Based Broadcast Encryption Schemes.