Advances in Cryptology – EUROCRYPT 2008

27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings

  • Editors
  • Nigel Smart
Conference proceedings EUROCRYPT 2008

DOI: 10.1007/978-3-540-78967-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4965)

Table of contents (31 papers)

  1. Front Matter
  2. A Practical Attack on KeeLoq
    Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel
    Pages 1-18
  3. Key Recovery on Hidden Monomial Multivariate Schemes
    Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern
    Pages 19-30
  4. Predicting Lattice Reduction
    Nicolas Gama, Phong Q. Nguyen
    Pages 31-51
  5. Efficient Sequential Aggregate Signed Data
    Gregory Neven
    Pages 52-69
  6. Threshold RSA for Dynamic and Ad-Hoc Groups
    Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
    Pages 88-107
  7. Towards Key-Dependent Message Security in the Standard Model
    Dennis Hofheinz, Dominique Unruh
    Pages 108-126
  8. The Twin Diffie-Hellman Problem and Applications
    David Cash, Eike Kiltz, Victor Shoup
    Pages 127-145
  9. On the Indifferentiability of the Sponge Construction
    Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
    Pages 181-197
  10. A New Mode of Operation for Block Ciphers and Length-Preserving MACs
    Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya
    Pages 198-219
  11. Security/Efficiency Tradeoffs for Permutation-Based Hashing
    Phillip Rogaway, John Steinberger
    Pages 220-236
  12. New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
    Lei Wang, Kazuo Ohta, Noboru Kunihiro
    Pages 237-253
  13. Collisions for the LPS Expander Graph Hash Function
    Jean-Pierre Tillich, Gilles Zémor
    Pages 254-269
  14. Second Preimage Attacks on Dithered Hash Functions
    Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir et al.
    Pages 270-288
  15. Efficient Two Party and Multi Party Computation Against Covert Adversaries
    Vipul Goyal, Payman Mohassel, Adam Smith
    Pages 289-306
  16. Almost-Everywhere Secure Computation
    Juan A. Garay, Rafail Ostrovsky
    Pages 307-323
  17. Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
    Kaoru Kurosawa, Kazuhiro Suzuki
    Pages 324-340

About these proceedings


Keeloq Zero Knowledge anonymity authentication block ciphers computational number theory cryptanalysis cryptographic attacks cryptographic hash functions cryptographic protocols cryptographic systems cryptography cryptology data encryption data security

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-78966-6
  • Online ISBN 978-3-540-78967-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349