Advances in Cryptology - CRYPTO 2007

27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings

Editors:

ISBN: 978-3-540-74142-8 (Print) 978-3-540-74143-5 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis I

    1. Book Chapter

      Pages 1-12

      Practical Cryptanalysis of SFLASH

    2. Book Chapter

      Pages 13-30

      Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5

  3. Secure Searching

    1. Book Chapter

      Pages 31-49

      How Should We Solve Search Problems Privately?

    2. Book Chapter

      Pages 50-67

      Public Key Encryption That Allows PIR Queries

  4. Invited Talk

    1. Book Chapter

      Pages 68-91

      Information Security Economics – and Beyond

  5. Theory I

    1. Book Chapter

      Pages 92-110

      Cryptography with Constant Input Locality

    2. Book Chapter

      Pages 111-129

      Universally-Composable Two-Party Computation in Two Rounds

    3. Book Chapter

      Pages 130-149

      Indistinguishability Amplification

  6. Lattices

    1. Book Chapter

      Pages 150-169

      A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU

    2. Book Chapter

      Pages 170-186

      Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm

  7. Random Oracles

    1. Book Chapter

      Pages 187-204

      Domain Extension of Public Random Functions: Beyond the Birthday Barrier

    2. Book Chapter

      Pages 205-223

      Random Oracles and Auxiliary Input

  8. Hash Functions

    1. Book Chapter

      Pages 224-243

      Security-Amplifying Combiners for Collision-Resistant Hash Functions

    2. Book Chapter

      Pages 244-263

      Hash Functions and the (Amplified) Boomerang Attack

    3. Book Chapter

      Pages 264-283

      Amplifying Collision Resistance: A Complexity-Theoretic Treatment

  9. Theory II

    1. Book Chapter

      Pages 284-302

      How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?

    2. Book Chapter

      Pages 303-322

      Simulatable VRFs with Applications to Multi-theorem NIZK

    3. Book Chapter

      Pages 323-341

      Cryptography in the Multi-string Model

  10. Quantum Cryptography

    1. Book Chapter

      Pages 342-359

      Secure Identification and QKD in the Bounded-Quantum-Storage Model

    2. Book Chapter

      Pages 360-378

      A Tight High-Order Entropic Quantum Uncertainty Relation with Applications

previous Page of 2