Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Advances in Cryptology – EUROCRYPT 2007 -

Advances in Cryptology – EUROCRYPT 2007

26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings

Moni Naor (Herausgeber)

Buch | Softcover
XIII, 591 Seiten
2007 | 2007
Springer Berlin (Verlag)
978-3-540-72539-8 (ISBN)
CHF 74,85 inkl. MwSt
lt;p>This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007. The 33 revised full papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities.- Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist.- The Collision Intractability of MDC-2 in the Ideal-Cipher Model.- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.- Revisiting the Efficiency of Malicious Two-Party Computation.- Efficient Two-Party Secure Computation on Committed Inputs.- Universally Composable Multi-party Computation Using Tamper-Proof Hardware.- Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model.- Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability.- Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility.- Zero Knowledge and Soundness Are Symmetric.- Mesh Signatures.- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.- Batch Verification of Short Signatures.- Cryptanalysis of SFLASH with Slightly Modified Parameters.- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy.- Secure Computation from Random Error Correcting Codes.- Round-Efficient Secure Computation in Point-to-Point Networks.- Atomic Secure Multi-party Multiplication with Low Communication.- Cryptanalysis of the Sidelnikov Cryptosystem.- Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables.- An L (1/3?+??) Algorithm for the Discrete Logarithm Problem for Low Degree Curves.- General Ad Hoc Encryption from Exponent Inversion IBE.- Non-interactive Proofs for Integer Multiplication.- Ate Pairing on Hyperelliptic Curves.- Ideal Multipartite Secret Sharing Schemes.- Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt toCope with 1024-Bit.- Divisible E-Cash Systems Can Be Truly Anonymous.- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security.- Range Extension for Weak PRFs; The Good, the Bad, and the Ugly.- Feistel Networks Made Public, and Applications.- Oblivious-Transfer Amplification.- Simulatable Adaptive Oblivious Transfer.

Erscheint lt. Verlag 9.5.2007
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XIII, 591 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 844 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Algorithm analysis and problem complexity • algorithms • anonymity • authentication • biometric anthentication • Communication • computational entropy • Computational Number Theory • Cryptanalysis • Cryptographic Attacks • cryptographic hash functions • cryptographic protocols • Cryptographic Systems • cryptography • Cryptology • data encryption • Data Security • DES • Digital Signature Systems • Elliptic Curve Cryptography • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • hyperelliptic curves • Information Security • Networks • oblivious-transfer • privacy • Public Key Cryptography • rsa • secure communication • security • Sflash • SIGNATUR • Systems Security • verification • x.509 • Zero Knowledge
ISBN-10 3-540-72539-3 / 3540725393
ISBN-13 978-3-540-72539-8 / 9783540725398
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich