Advances in Cryptology - EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings /
These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Da...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Security and Cryptology ;
3494 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Cryptanalysis I
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Collisions of SHA-0 and Reduced SHA-1
- Theory I
- Reducing Complexity Assumptions for Statistically-Hiding Commitment
- Smooth Projective Hashing and Two-Message Oblivious Transfer
- On Robust Combiners for Oblivious Transfer and Other Primitives
- Encryption I
- Efficient Identity-Based Encryption Without Random Oracles
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Signatures and Authentication
- Secure Remote Authentication Using Biometric Data
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
- 3-Move Undeniable Signature Scheme
- Group Signatures with Efficient Concurrent Join
- Algebra and Number Theory I
- Floating-Point LLL Revisited
- Practical Cryptography in High Dimensional Tori
- A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
- Quantum Cryptography
- Computational Indistinguishability Between Quantum States and Its Cryptographic Application
- Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
- Secure Protocols
- Compact E-Cash
- Cryptographic Asynchronous Multi-party Computation with Optimal Resilience
- Algebra and Number Theory II
- Differential Cryptanalysis for Multivariate Schemes
- A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
- Partial Key Exposure Attacks on RSA up to Full Size Exponents
- The RSA Group is Pseudo-Free
- Theory II
- Universally Composable Password-Based Key Exchange
- Mercurial Commitments with Applications to Zero-Knowledge Sets
- Encryption II
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Cryptanalysis II
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Related-Key Boomerang and Rectangle Attacks
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- Broadcast Encryption and Traitor Tracing
- Public Traceability in Traitor Tracing Schemes
- One-Way Chain Based Broadcast Encryption Schemes.