This website does readability filtering of other pages. All styles, scripts, forms and ads are stripped. If you want your website excluded or have other feedback, use this form.

Advances in Cryptology - EUROCRYPT 2005: 24th Annual International ... - EUROCRYPT - Google Books

Search Images Maps Play YouTube News Gmail Drive More » Sign in

Books

books.google.ca - These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg?...https://books.google.ca/books/about/Advances_in_Cryptology_EUROCRYPT_2005.html?id=HrCI4ZyuZL0C&utm_source=gb-gplus-shareAdvances in Cryptology - EUROCRYPT 2005
  1. My library
  2. Help
  3. Advanced Book Search
View eBook

Get this book in print

Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings

EUROCRYPT Springer Science & Business Media, May 9, 2005 - Business & Economics - 576 pages 0 Reviewshttps://books.google.com/books/about/Advances_in_Cryptology_EUROCRYPT_2005.html?id=HrCI4ZyuZL0C These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg? ard was responsible for local organization. TheEurocrypt2005ProgramCommittee(PC)consistedof30internationally renowned experts. Their names and a?liations are listed on pages VII and VIII of these proceedings. By the November 15, 2004 submission deadline the PC had received a total of 190 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, were committed to the IACR Web Review System. These were taken as the starting point for the PC-wideWeb-baseddiscussionphase.Duringthisphase,additionalreportswere provided as needed, and the PC eventually had some 700 reports at its disposal. In addition, the discussions generated more than 850 messages, all posted in the system. During the entire PC phase, which started in August 2003 with my earliest invitations to PC members and which continued until March 2005, more than 1000 email messages were communicated. Moreover, the PC received much appreciated assistance from a large body of external reviewers. Their names are listed on page VIII of these proceedings. Preview this book »

What people are saying - Write a review

We haven't found any reviews in the usual places.

Selected pages


Title Page
Index
References

Contents

Cryptanalysis of the Hash Functions MD4 and RIPEMD 1 How to Break MD5 and Other Hash Functions 19 Collisions of SHA0 and Reduced SHA1 36 Reducing Complexity Assumptions for StatisticallyHiding Commitment 58 Smooth Projective Hashing and TwoMessage Oblivious Transfer 78 On Robust Combiners for Oblivious Transfer and Other Primitives 96 Efficient IdentityBased Encryption Without Random Oracles 114 A New Framework for Hybrid Encryption and New Analysis of KurosawaDesmedt KEM 128 Cryptographic Asynchronous Multiparty Computation with Optimal Resilience Extended Abstract 322 Differential Cryptanalysis for Multivariate Schemes 341 A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem 354 Partial Key Exposure Attacks on RSA Up to Full Size Exponents 371 The RSA Group is PseudoFree 387 Universally Composable PasswordBased Key Exchange 404 Extended Abstract 422 Hierarchical Identity Based Encryption with Constant Size Ciphertext 440

MoreSecure Remote Authentication Using Biometric Data 147 Stronger Security Bounds for WegmanCarterShoup Authenticators 164 3Move Undeniable Signature Scheme 181 Group Signatures with Efficient Concurrent Join 198 FloatingPoint LLL Revisited 215 Practical Cryptography in High Dimensional Tori 234 A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers 251 Computational Indistinguishability Between Quantum States and Its Cryptographic Application 268 Approximate Quantum ErrorCorrecting Codes and Secret Sharing Schemes 285 Compact ECash 302 Fuzzy IdentityBased Encryption 457 Second Preimages on nBit Hash Functions for Much Less than 2n Work 474 Predicting and Distinguishing Attacks on RC4 Keystream Generator 491 RelatedKey Boomerang and Rectangle Attacks 507 On the Impossibility of HighlyEfficient BlockcipherBased Hash Functions 526 Public Traceability in Traitor Tracing Schemes 542 OneWay Chain Based Broadcast Encryption Schemes 559 Author Index 575 Copyright

Less

Other editions - View all

Advances in Cryptology - EUROCRYPT 2005: 24th Annual International ...
Ronald Cramer
Limited preview - 2005
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International ...
Ronald Cramer
No preview available - 2005

Common terms and phrases

Advances in Cryptology adversary algorithm applications assumption attack authentication bilinear map biometric blockcipher Boneh bound chosen ciphertext collision commitment scheme complexity compression function Computer Science construction CRYPTO cryptographic Cryptology cryptosystems decryption define defined definition denote difference differential distribution efficient encryption scheme equations EUROCRYPT expandable message given group signature hash family hash function HIBE identity Identity-Based Encryption input integer iteration lattice Lecture Notes Lemma linear LNCS mercurial commitments message block Notes in Computer oblivious transfer one-way functions output pair parameters parties password permutation plaintext polynomial polynomial-time prime private key probability problem projective hash proof protocol prove public key QSCDff quantum queries random oracle related-key result RIPEMD rounds safe primes secret secret sharing Section signature scheme simulator Springer-Verlag subkey technique Theorem traitor tracing undeniable signature variables vector zero-knowledge zero-knowledge proofs

About the author (2005)

Ronald Cramer is a Professor of Mathematics at Leiden University and head of the Cryptology Research Group at the Centrum Wiskunde and Informatica, Amsterdam: the National Research Institute for Mathematics and Computer Science in the Netherlands. He is a member of the Royal Netherlands Academy of Arts and Sciences and a Fellow of the International Association for Cryptologic Research.

Bibliographic information

Title Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings
Volume 3494 of Lecture Notes in Computer Science
Security and Cryptology Author EUROCRYPT Editor Ronald Cramer Contributors Ronald L. Cramer, Ronald Cramer Edition illustrated Publisher Springer Science & Business Media, 2005 ISBN 3540259104, 9783540259107 Length 576 pages Subjects Computers  › Networking  › General

Business & Economics / Information Management
Computers / Computer Science
Computers / Data Processing
Computers / Information Technology
Computers / Information Theory
Computers / Networking / General
Computers / Networking / Hardware
Computers / Operating Systems / General
Computers / Programming / Algorithms
Computers / Security / Cryptography
Computers / Security / General
Language Arts & Disciplines / Library & Information Science / General
Mathematics / Discrete Mathematics &nbsp &nbsp Export Citation BiBTeX EndNote RefMan About Google Books - Privacy Policy - Terms of Service - Blog - Information for Publishers - Report an issue - Help - Sitemap - Google Home