Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. (English) Zbl 1107.94001

Lecture Notes in Computer Science 3494. Berlin: Springer (ISBN 3-540-25910-4/pbk). xiv, 576 p. (2005).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1051.94003).
Indexed articles:
Wang, Xiaoyun; Lai, Xuejia; Feng, Dengguo; Chen, Hui; Yu, Xiuyuan, Cryptanalysis of the hash functions MD4 and RIPEMD, 1-18 [Zbl 1137.94358]
Wang, Xiaoyun; Yu, Hongbo, How to break MD5 and other hash functions, 19-35 [Zbl 1137.94359]
Biham, Eli; Chen, Rafi; Joux, Antoine; Carribault, Patrick; Lemuet, Christophe; Jalby, William, Collisions of SHA-0 and reduced SHA-1, 36-57 [Zbl 1137.94337]
Haitner, Iftach; Horvitz, Omer; Katz, Jonathan; Koo, Chiu-Yuen; Morselli, Ruggero; Shaltiel, Ronen, Reducing complexity assumptions for statistically-hiding commitment, 58-77 [Zbl 1137.94345]
Kalai, Yael Tauman, Smooth projective hashing and two-message oblivious transfer, 78-95 [Zbl 1137.94348]
Harnik, Danny; Kilian, Joe; Naor, Moni; Reingold, Omer; Rosen, Alon, On robust combiners for oblivious transfer and other primitives, 96-113 [Zbl 1137.94346]
Waters, Brent, Efficient identity-based encryption without random oracles, 114-127 [Zbl 1137.94360]
Abe, Masayuki; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor, Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM, 128-146 [Zbl 1137.94336]
Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam, Secure remote authentication using biometric data, 147-163 [Zbl 1137.94365]
Bernstein, Daniel J., Stronger security bounds for Wegman-Carter-Shoup authenticators, 164-180 [Zbl 1137.94364]
Kurosawa, Kaoru; Heng, Swee-Huay, 3-move undeniable signature scheme, 181-197 [Zbl 1137.94375]
Kiayias, Aggelos; Yung, Moti, Group signatures with efficient concurrent join, 198-214 [Zbl 1137.94373]
Nguên, Phong Q.; Stehlé, Damien, Floating-point LLL revisited, 215-233 [Zbl 1137.94353]
van Dijk, Marten; Granger, Robert; Page, Dan; Rubin, Karl; Silverberg, Alice; Stam, Martijn; Woodruff, David, Practical cryptography in high dimensional tori, 234-250 [Zbl 1137.94362]
Blömer, Johannes; May, Alexander, A tool kit for finding small roots of bivariate polynomials over the integers, 251-267 [Zbl 1137.11359]
Kawachi, Akinori; Koshiba, Takeshi; Nishimura, Harumichi; Yamakami, Tomoyuki, Computational indistinguishability between quantum states and its cryptographic application, 268-284 [Zbl 1137.94349]
Crépeau, Claude; Gottesman, Daniel; Smith, Adam, Approximate quantum error-correcting codes and secret sharing schemes, 285-301 [Zbl 1137.94371]
Camenisch, Jan; Hohenberger, Susan; Lysyanskaya, Anna, Compact e-cash, 302-321 [Zbl 1137.94366]
Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz, Cryptographic asynchronous multi-party computation with optimal resilience (extended abstract), 322-340 [Zbl 1137.94372]
Fouque, Pierre-Alain; Granboulan, Louis; Stern, Jacques, Differential cryptanalysis for multivariate schemes, 341-353 [Zbl 1137.94344]
Perret, Ludovic, A fast cryptanalysis of the isomorphism of polynomials with one secret problem, 354-370 [Zbl 1137.94354]
Ernst, Matthias; Jochemsz, Ellen; May, Alexander; de Weger, Benne, Partial key exposure attacks on RSA up to full size exponents, 371-386 [Zbl 1137.94343]
Micciancio, Daniele, The RSA group is pseudo-free, 387-403 [Zbl 1137.94352]
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil, Universally composable password-based key exchange, 404-421 [Zbl 1137.94367]
Chase, Melissa; Healy, Alexander; Lysyanskaya, Anna; Malkin, Tal; Reyzin, Leonid, Mercurial commitments with applications to zero-knowledge sets (extended abstract), 422-439 [Zbl 1137.94369]
Boneh, Dan; Boyen, Xavier; Goh, Eu-Jin, Hierarchical identity based encryption with constant size ciphertext, 440-456 [Zbl 1137.94340]
Sahai, Amit; Waters, Brent, Fuzzy identity-based encryption, 457-473 [Zbl 1137.94355]
Kelsey, John; Schneier, Bruce, Second preimages on \(n\)-bit hash functions for much less than \(2^{n}\) work, 474-490 [Zbl 1137.94350]
Mantin, Itsik, Predicting and distinguishing attacks on RC4 keystream generator, 491-506 [Zbl 1137.94351]
Biham, Eli; Dunkelman, Orr; Keller, Nathan, Related-key boomerang and rectangle attacks, 507-525 [Zbl 1137.94338]
Black, John; Cochran, Martin; Shrimpton, Thomas, On the impossibility of highly-efficient blockcipher-based hash functions, 526-541 [Zbl 1137.94339]
Chabanne, Hervé; Phan, Duong Hieu; Pointcheval, David, Public traceability in traitor tracing schemes, 542-558 [Zbl 1137.94368]
Jho, Nam-Su; Hwang, Jung Yeon; Cheon, Jung Hee; Kim, Myung-Hwan; Lee, Dong Hoon; Yoo, Eun Sun, One-way chain based broadcast encryption schemes, 559-574 [Zbl 1137.94347]


94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest


Zbl 1051.94003
Full Text: DOI