Advances in Cryptology – CRYPTO 2005

25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings

  • Victor Shoup
Conference proceedings CRYPTO 2005

DOI: 10.1007/11535218

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3621)

Table of contents (33 papers)

  1. Front Matter
  2. Efficient Collision Search Attacks on SHA-0
    Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
    Pages 1-16
  3. Finding Collisions in the Full SHA-1
    Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
    Pages 17-36
  4. Pebbling and Proofs of Work
    Cynthia Dwork, Moni Naor, Hoeteck Wee
    Pages 37-54
  5. Composition Does Not Imply Adaptive Security
    Krzysztof Pietrzak
    Pages 55-65
  6. On the Discrete Logarithm Problem on Algebraic Tori
    R. Granger, F. Vercauteren
    Pages 66-85
  7. A Practical Attack on a Braid Group Based Cryptographic Protocol
    Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov
    Pages 86-96
  8. Impossibility and Feasibility Results for Zero Knowledge with Public Keys
    Joël Alwen, Giuseppe Persiano, Ivan Visconti
    Pages 135-151
  9. A Formal Treatment of Onion Routing
    Jan Camenisch, Anna Lysyanskaya
    Pages 169-187
  10. Simple and Efficient Shuffling with Provable Correctness and ZK Privacy
    Kun Peng, Colin Boyd, Ed Dawson
    Pages 188-204
  11. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
    Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange et al.
    Pages 205-222
  12. Private Searching on Streaming Data
    Rafail Ostrovsky, William E. Skeith III
    Pages 223-240
  13. Privacy-Preserving Set Operations
    Lea Kissner, Dawn Song
    Pages 241-257
  14. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
    Dan Boneh, Craig Gentry, Brent Waters
    Pages 258-275
  15. Generic Transformation for Scalable Broadcast Encryption Schemes
    Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
    Pages 276-292
  16. Authenticating Pervasive Devices with Human Protocols
    Ari Juels, Stephen A. Weis
    Pages 293-308

About these proceedings


Bluetooth Information algebraic geometry anonymity communication cryptographic protocols cryptography cryptology data encryption database digital signatures multiparty computation privacy public key cryptography security

Editors and affiliations

  • Victor Shoup
    • 1
  1. 1.New York University 

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-28114-6
  • Online ISBN 978-3-540-31870-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349