zbMATH — the first resource for mathematics

Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. (English) Zbl 1069.94501
Lecture Notes in Computer Science 3376. Berlin: Springer (ISBN 3-540-24399-2/pbk). x, 385 p. (2005).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1049.94004).
Indexed articles:
Dwork, Cynthia, Sub-linear queries statistical databases: Privacy with power, 1-6 [Zbl 1081.94522]
Young, Adam; Yung, Moti, Malicious cryptography: Kleptographic aspects, 7-18 [Zbl 1079.94577]
Billet, Olivier; Gilbert, Henri, Resistance of SNOW 2.0 against algebraic attacks, 19-28 [Zbl 1079.94533]
Braeken, An; Wolf, Christopher; Preneel, Bart, A study of the security of unbalanced oil and vinegar signature schemes, 29-43 [Zbl 1079.94536]
Gutterman, Zvi; Malkhi, Dahlia, Hold your sessions: An attack on Java session-id generation, 44-57 [Zbl 1079.94549]
Rijmen, Vincent; Oswald, Elisabeth, Update on SHA-1, 58-71 [Zbl 1079.94571]
Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Bao, Feng, A fast correlation attack on the shrinking generator, 72-86 [Zbl 1079.94579]
Boneh, Dan; Katz, Jonathan, Improved efficiency for CCA-secure cryptosystems built using identity-based encryption, 87-103 [Zbl 1079.94535]
Cui, Yang; Kobara, Kazukuni; Imai, Hideki, A generic conversion with optimal redundancy, 104-117 [Zbl 1079.94542]
Howgrave-Graham, Nick; Silverman, Joseph H.; Whyte, William, Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3, 118-135 [Zbl 1079.94553]
Bellare, Mihir; Shi, Haixia; Zhang, Chong, Foundations of group signatures: the case of dynamic groups, 136-153 [Zbl 1079.94013]
Laguillaumie, Fabien; Vergnaud, Damien, Time-selective convertible undeniable signatures, 154-171 [Zbl 1079.94557]
Herzberg, Amir, On tolerant cryptographic constructions, 172-190 [Zbl 1079.94550]
Abdalla, Michel; Pointcheval, David, Simple password-based encrypted key exchange protocols, 191-208 [Zbl 1079.94529]
Mackenzie, Philip; Patel, Sarvar, Hard bits of the discrete log with applications to password authentication, 209-226 [Zbl 1079.94560]
Szydlo, Michael; Kaliski, Burton, Proofs for two-server password authentication, 227-244 [Zbl 1079.94574]
Yao, Frances F.; Yin, Yiqun Lisa, Design and analysis of password-based key derivation functions, 245-261 [Zbl 1079.94576]
McCullagh, Noel; Barreto, Paulo S. L. M., A new two-party identity-based authenticated key agreement, 262-274 [Zbl 1079.94563]
Nguyen, Lan, Accumulators from bilinear pairings and applications, 275-292 [Zbl 1079.94568]
Scott, Michael, Computing the Tate pairing, 293-304 [Zbl 1079.94572]
Yuen, Tsz Hon; Wei, Victor K., Fast and proven secure blind identity-based signcryption from pairings, 305-322 [Zbl 1079.94578]
Mentens, Nele; Batina, Lejla; Preneel, Bart; Verbauwhede, Ingrid, A systematic evaluation of compact hardware implementations for the Rijndael S-box, 323-333 [Zbl 1079.94564]
Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake, CryptoGraphics: Secret key cryptography using graphics cards, 334-350 [Zbl 1079.94540]
Mangard, Stefan; Popp, Thomas; Gammel, Berndt M., Side-channel leakage of masked CMOS gates, 351-365 [Zbl 1079.94561]
Muir, James A.; Stinson, Douglas R., New minimal weight representations for left-to-right window methods, 366-383 [Zbl 1079.94566]

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI