Book Volume 2656 2003

Advances in Cryptology — EUROCRYPT 2003

International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings


ISBN: 978-3-540-14039-9 (Print) 978-3-540-39200-2 (Online)

Table of contents (39 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIV

  2. Cryptanalysis I

    1. Chapter

      Pages 1-16

      Cryptanalysis of the EMD Mode of Operation

    2. Chapter

      Pages 17-32

      On the Optimality of Linear, Differential, and Sequential Distinguishers

    3. Chapter

      Pages 33-50

      A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms

  3. Secure Multi-party Computation I

    1. Chapter

      Pages 51-67

      Two-Threshold Broadcast and Detectable Multi-party Computation

    2. Chapter

      Pages 68-86

      On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions

    3. Chapter

      Pages 87-105

      Fair Secure Two-Party Computation

  4. Invited Talk I

    1. Chapter

      Pages 106-122

      Facts and Myths of Enigma: Breaking Stereotypes

  5. Zero-Knowledge Protocols

    1. Chapter

      Pages 123-139

      Resettable Zero-Knowledge in the Weak Public-Key Model

    2. Chapter

      Pages 140-159

      Simulatable Commitments and Efficient Concurrent Zero-Knowledge

    3. Chapter

      Pages 160-176

      Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition

    4. Chapter

      Pages 177-194

      Strengthening Zero-Knowledge Protocols Using Signatures

  6. Foundations and Complexity Theoretic Security

    1. Chapter

      Pages 195-210

      Nearly One-Sided Tests and the Goldreich-Levin Predicate

    2. Chapter

      Pages 211-228

      Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications

  7. Public Key Encryption

    1. Chapter

      Pages 229-240

      A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem

    2. Chapter

      Pages 241-254

      A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions

    3. Chapter

      Pages 255-271

      A Forward-Secure Public-Key Encryption Scheme

    4. Chapter

      Pages 272-293

      Certificate-Based Encryption and the Certificate Revocation Problem

  8. New Primitives

    1. Chapter

      Pages 294-311

      CAPTCHA: Using Hard AI Problems for Security

    2. Chapter

      Pages 312-329

      Concealment and Its Applications to Authenticated Encryption

  9. Cryptanalysis II

    1. Chapter

      Pages 330-344

      Predicting the Shrinking Generator with Fixed Connections

previous Page of 2