Advances in Cryptology - EUROCRYPT 2006

24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedings

Editors:

ISBN: 978-3-540-34546-6 (Print) 978-3-540-34547-3 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis

    1. Book Chapter

      Pages 1-11

      Security Analysis of the Strong Diffie-Hellman Problem

    2. Book Chapter

      Pages 12-29

      Cryptography in Theory and Practice: The Case of Encryption in IPsec

    3. Book Chapter

      Pages 30-47

      Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects

  3. Invited Talk I

    1. Book Chapter

      Pages 48-58

      Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt

  4. Cryptography Meets Humans

    1. Book Chapter

      Pages 59-72

      Hiding Secret Points Amidst Chaff

    2. Book Chapter

      Pages 73-87

      Parallel and Concurrent Security of the HB and HB +  Protocols

    3. Book Chapter

      Pages 88-108

      Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol

  5. Stream Ciphers

    1. Book Chapter

      Pages 109-128

      QUAD: A Practical Stream Cipher with Provable Security

    2. Book Chapter

      Pages 129-146

      How to Strengthen Pseudo-random Generators by Using Compression

    3. Book Chapter

      Pages 147-164

      Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks

  6. Hash Functions

    1. Book Chapter

      Pages 165-182

      VSH, an Efficient and Provable Collision-Resistant Hash Function

    2. Book Chapter

      Pages 183-200

      Herding Hash Functions and the Nostradamus Attack

  7. Oblivious Transfer

    1. Book Chapter

      Pages 201-221

      Optimal Reductions Between Oblivious Transfers Using Interactive Hashing

    2. Book Chapter

      Pages 222-232

      Oblivious Transfer Is Symmetric

  8. Numbers and Lattices

    1. Book Chapter

      Pages 233-253

      Symplectic Lattice Reduction and NTRU

    2. Book Chapter

      Pages 254-270

      The Function Field Sieve in the Medium Prime Case

    3. Book Chapter

      Pages 271-288

      Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures

  9. Foundations

    1. Book Chapter

      Pages 289-307

      The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model

    2. Book Chapter

      Pages 308-327

      Private Circuits II: Keeping Secrets in Tamperable Circuits

    3. Book Chapter

      Pages 328-338

      Composition Implies Adaptive Security in Minicrypt

previous Page of 2