Advances in Cryptology – CRYPTO 2005

25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings

Editors:

ISBN: 978-3-540-28114-6 (Print) 978-3-540-31870-5 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Book Chapter

    Pages 1-16

    Efficient Collision Search Attacks on SHA-0

  3. Book Chapter

    Pages 17-36

    Finding Collisions in the Full SHA-1

  4. Book Chapter

    Pages 37-54

    Pebbling and Proofs of Work

  5. Book Chapter

    Pages 55-65

    Composition Does Not Imply Adaptive Security

  6. Book Chapter

    Pages 66-85

    On the Discrete Logarithm Problem on Algebraic Tori

  7. Book Chapter

    Pages 86-96

    A Practical Attack on a Braid Group Based Cryptographic Protocol

  8. Book Chapter

    Pages 97-117

    The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption

  9. Book Chapter

    Pages 118-134

    Unconditional Characterizations of Non-interactive Zero-Knowledge

  10. Book Chapter

    Pages 135-151

    Impossibility and Feasibility Results for Zero Knowledge with Public Keys

  11. Book Chapter

    Pages 152-168

    Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors

  12. Book Chapter

    Pages 169-187

    A Formal Treatment of Onion Routing

  13. Book Chapter

    Pages 188-204

    Simple and Efficient Shuffling with Provable Correctness and ZK Privacy

  14. Book Chapter

    Pages 205-222

    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

  15. Book Chapter

    Pages 223-240

    Private Searching on Streaming Data

  16. Book Chapter

    Pages 241-257

    Privacy-Preserving Set Operations

  17. Book Chapter

    Pages 258-275

    Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys

  18. Book Chapter

    Pages 276-292

    Generic Transformation for Scalable Broadcast Encryption Schemes

  19. Book Chapter

    Pages 293-308

    Authenticating Pervasive Devices with Human Protocols

  20. Book Chapter

    Pages 309-326

    Secure Communications over Insecure Channels Based on Short Authenticated Strings

  21. Book Chapter

    Pages 327-343

    On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes

previous Page of 2