Advances in Cryptology – EUROCRYPT 2005
Springer Berlin (Verlag)
978-3-540-25910-7 (ISBN)
Cryptanalysis I.- Cryptanalysis of the Hash Functions MD4 and RIPEMD.- How to Break MD5 and Other Hash Functions.- Collisions of SHA-0 and Reduced SHA-1.- Theory I.- Reducing Complexity Assumptions for Statistically-Hiding Commitment.- Smooth Projective Hashing and Two-Message Oblivious Transfer.- On Robust Combiners for Oblivious Transfer and Other Primitives.- Encryption I.- Efficient Identity-Based Encryption Without Random Oracles.- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.- Signatures and Authentication.- Secure Remote Authentication Using Biometric Data.- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators.- 3-Move Undeniable Signature Scheme.- Group Signatures with Efficient Concurrent Join.- Algebra and Number Theory I.- Floating-Point LLL Revisited.- Practical Cryptography in High Dimensional Tori.- A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers.- Quantum Cryptography.- Computational Indistinguishability Between Quantum States and Its Cryptographic Application.- Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes.- Secure Protocols.- Compact E-Cash.- Cryptographic Asynchronous Multi-party Computation with Optimal Resilience.- Algebra and Number Theory II.- Differential Cryptanalysis for Multivariate Schemes.- A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem.- Partial Key Exposure Attacks on RSA up to Full Size Exponents.- The RSA Group is Pseudo-Free.- Theory II.- Universally Composable Password-Based Key Exchange.- Mercurial Commitments with Applications to Zero-Knowledge Sets.- Encryption II.- Hierarchical Identity Based Encryption with Constant Size Ciphertext.- Fuzzy Identity-Based Encryption.- Cryptanalysis II.- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work.- Predicting and Distinguishing Attacks on RC4 Keystream Generator.- Related-Key Boomerang and Rectangle Attacks.- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.- Broadcast Encryption and Traitor Tracing.- Public Traceability in Traitor Tracing Schemes.- One-Way Chain Based Broadcast Encryption Schemes.
Erscheint lt. Verlag | 9.5.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 578 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 826 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • Calculus • Complexity • Computational Number Theory • Cryptanalysis • cryptographic attacs • cryptographic protocols • cryptography • Cryptology • data encryption • Data Security • digital signature schemes • Information Security • Oracle • privacy • Quantum Cryptography • rsa • security • SIGNATUR |
ISBN-10 | 3-540-25910-4 / 3540259104 |
ISBN-13 | 978-3-540-25910-7 / 9783540259107 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich