Advances in cryptology -- EUROCRYPT 2005 : 24th annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005 : proceedings / Ronald Cramer (ed.).

By: (24th : EUROCRYPT (Conference) (24th : 2005 : Århus, Denmark)
Contributor(s): Cramer, Ronald, 1968- | International Association for Cryptologic Research
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 3494.Publisher: Berlin ; New York : Springer, ©2005Description: 1 online resource (xiv, 576 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540320555; 3540320555; 3540259104; 9783540259107Other title: EUROCRYPT 2005 | 24th annual International Conference on the Theory and Applications of Cryptographic Techniques | Twenty-fourth annual International Conference on the Theory and Applications of Cryptographic Techniques | Annual International Conference on the Theory and Applications of Cryptographic Techniques | International Conference on the Theory and Applications of Cryptographic TechniquesSubject(s): Computers -- Access control -- Congresses | Cryptography -- Congresses | Data transmission systems -- Security measures -- Congresses | Ordinateurs -- Accès -- Contrôle -- Congrès | Données -- Transmission -- Sécurité -- Mesures -- Congrès | Cryptographie -- Congrès | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Informatique | Computers -- Access control | Cryptography | Data transmission systems -- Security measures | algoritmen | algorithms | computeranalyse | computer analysis | wiskunde | mathematics | informatiesystemen | information systems | computerwetenschappen | computer sciences | computernetwerken | computer networks | gegevensbeheer | data management | operating systems | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Advances in cryptology -- EUROCRYPT 2005.DDC classification: 005.82 LOC classification: QA76.9.A25 | E964 2005Online resources: Click here to access online
Contents:
Cryptanalysis of the Hash functions MD4 and RIPEMD / Xiaoyun Wang [and others] -- How to break MD5 and other Hash functions / Xiaoyun Wang, Hongbo Yu -- Collisions of SHA-0 and reduced SHA-1 / Eli Biham [and others] -- Complexity assumptions for statistically-hiding commitment / Iftach Haitner [and others] -- Smooth projective hashing and two-message smooth projective hashing and two-message oblivious transfer / Yael Tauman Kalai -- On robust combiners for oblivious transfer and other primitives / Danny Harnik -- Efficient identity-based encryption without random oracles / Brent Waters -- Tag-KEM/DEM : a new framework for hybrid encryption and new analysis of Kurosawa-Desmedt KEM / Masayuki Abe [and others] -- Secure remote authentication using biometric data / Xavier Boyen [and others] -- Stronger security bounds for Wegman-Carter-Shoup authenticators / Daniel J. Bernstein -- 3-Move undeniable signature scheme / Kaoru Kurosawa, Swee-Huay Heng -- Group signatures with efficient concurrent join / Aggelos Kiayias, Moti Yung -- Floating-point lll revisited /Phong Q. Nguyn, Damien Stehle -- Practical cryptography in high dimensional tori / Marten van Dijk [and others] -- A tool kit for finding small roots of bivariate polynomials over the integers / Johannes Blomer, Alexander May -- Computational indistinguishability between quantum states and its cryptographic application / Akinori Kawachi [and others] -- Approximate quantum error-correcting codes and secret sharing schemes / Claude Crepeau, Daniel Gottesman, Adam Smith -- Compact e-cash / Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya -- Cryptographic asynchronous multi-party computation with optimal resilience / Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek -- Differential cryptanalysis for multivariate schemes / Pierre-Alain Fouque, Louis Granboulan, Jacques Stern -- A fast cryptanalysis of the isomorphism of polynomials with one secret problem / Ludovic Perret -- The RSA group is pseudo-free / Daniele Micciancio -- Universally composable password-based key exchange / Ran Canetti -- Mercurial commitments with applications to zero-knowledge sets / Melissa Chase [and others] -- Hierarchical identity based encryption with constant size ciphertext -- Dan Boneh, Xavier Boyen, Eu-Jin Goh -- Fuzzy identity-based encryption / Amit Sahai, Brent Waters -- Second pre-images on n-bit hash functions for much less than 2n work / John Kelsey, Bruce Schneier -- Predicting and distinguishing attacks on rc4 keystream generator / Itsik Mantin -- Related-key boomerang and rectangle attacks / Eli Biham, Orr Dunkelman, Nathan Keller -- On the impossibility of highly-efficient blockcipher-based hash functions / John Black, Martin Cochran, Thomas Shrimpton -- Public traceability in traitor tracing schemes Herve Chabanne, Duong Hieu Phan, David Pointcheval -- One-way chain based broadcast encryption schemes / Nam-Su Jho.
Summary: "These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research, this year in cooperation with the Computer Science Department of the University of Aarhus, Denmark."
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

"International Association for Cryptologic Research"--Cover.

Includes bibliographical references and index.

"These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research, this year in cooperation with the Computer Science Department of the University of Aarhus, Denmark."

Print version record.

Cryptanalysis of the Hash functions MD4 and RIPEMD / Xiaoyun Wang [and others] -- How to break MD5 and other Hash functions / Xiaoyun Wang, Hongbo Yu -- Collisions of SHA-0 and reduced SHA-1 / Eli Biham [and others] -- Complexity assumptions for statistically-hiding commitment / Iftach Haitner [and others] -- Smooth projective hashing and two-message smooth projective hashing and two-message oblivious transfer / Yael Tauman Kalai -- On robust combiners for oblivious transfer and other primitives / Danny Harnik -- Efficient identity-based encryption without random oracles / Brent Waters -- Tag-KEM/DEM : a new framework for hybrid encryption and new analysis of Kurosawa-Desmedt KEM / Masayuki Abe [and others] -- Secure remote authentication using biometric data / Xavier Boyen [and others] -- Stronger security bounds for Wegman-Carter-Shoup authenticators / Daniel J. Bernstein -- 3-Move undeniable signature scheme / Kaoru Kurosawa, Swee-Huay Heng -- Group signatures with efficient concurrent join / Aggelos Kiayias, Moti Yung -- Floating-point lll revisited /Phong Q. Nguyn, Damien Stehle -- Practical cryptography in high dimensional tori / Marten van Dijk [and others] -- A tool kit for finding small roots of bivariate polynomials over the integers / Johannes Blomer, Alexander May -- Computational indistinguishability between quantum states and its cryptographic application / Akinori Kawachi [and others] -- Approximate quantum error-correcting codes and secret sharing schemes / Claude Crepeau, Daniel Gottesman, Adam Smith -- Compact e-cash / Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya -- Cryptographic asynchronous multi-party computation with optimal resilience / Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek -- Differential cryptanalysis for multivariate schemes / Pierre-Alain Fouque, Louis Granboulan, Jacques Stern -- A fast cryptanalysis of the isomorphism of polynomials with one secret problem / Ludovic Perret -- The RSA group is pseudo-free / Daniele Micciancio -- Universally composable password-based key exchange / Ran Canetti -- Mercurial commitments with applications to zero-knowledge sets / Melissa Chase [and others] -- Hierarchical identity based encryption with constant size ciphertext -- Dan Boneh, Xavier Boyen, Eu-Jin Goh -- Fuzzy identity-based encryption / Amit Sahai, Brent Waters -- Second pre-images on n-bit hash functions for much less than 2n work / John Kelsey, Bruce Schneier -- Predicting and distinguishing attacks on rc4 keystream generator / Itsik Mantin -- Related-key boomerang and rectangle attacks / Eli Biham, Orr Dunkelman, Nathan Keller -- On the impossibility of highly-efficient blockcipher-based hash functions / John Black, Martin Cochran, Thomas Shrimpton -- Public traceability in traitor tracing schemes Herve Chabanne, Duong Hieu Phan, David Pointcheval -- One-way chain based broadcast encryption schemes / Nam-Su Jho.

There are no comments for this item.

to post a comment.

Powered by Koha