Advances in Cryptology - CRYPTO 2006

26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings

  • Cynthia Dwork
Conference proceedings CRYPTO 2006

DOI: 10.1007/11818175

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4117)

Table of contents (36 papers)

  1. Front Matter
  2. Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
    Elad Barkan, Eli Biham, Adi Shamir
    Pages 1-21
  3. On the Power of the Randomized Iterate
    Iftach Haitner, Danny Harnik, Omer Reingold
    Pages 22-40
  4. Strengthening Digital Signatures Via Randomized Hashing
    Shai Halevi, Hugo Krawczyk
    Pages 41-59
  5. On Signatures of Knowledge
    Melissa Chase, Anna Lysyanskaya
    Pages 78-96
  6. Non-interactive Zaps and New Techniques for NIZK
    Jens Groth, Rafail Ostrovsky, Amit Sahai
    Pages 97-111
  7. Rankin’s Constant and Blockwise Lattice Reduction
    Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen
    Pages 112-130
  8. Lattice-Based Cryptography
    Oded Regev
    Pages 131-141
  9. A Method for Making Password-Based Key Exchange Resilient to Server Compromise
    Craig Gentry, Philip MacKenzie, Zulfikar Ramzan
    Pages 142-159
  10. Mitigating Dictionary Attacks on Password-Protected Local Storage
    Ran Canetti, Shai Halevi, Michael Steiner
    Pages 160-179
  11. Rationality and Adversarial Behavior in Multi-party Computation
    Anna Lysyanskaya, Nikos Triandopoulos
    Pages 180-197
  12. When Random Sampling Preserves Privacy
    Kamalika Chaudhuri, Nina Mishra
    Pages 198-213
  13. Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
    Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith
    Pages 232-250
  14. On Forward-Secure Storage
    Stefan Dziembowski
    Pages 251-270
  15. Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
    Rafael Pass, abhi shelat, Vinod Vaikuntanathan
    Pages 271-289
  16. Fast Algorithms for the Free Riders Problem in Broadcast Encryption
    Zulfikar Ramzan, David P. Woodruff
    Pages 308-325
  17. The Number Field Sieve in the Medium Prime Case
    Antoine Joux, Reynald Lercier, Nigel Smart, Frederik Vercauteren
    Pages 326-344

About these proceedings


Information Oracle algebraic geometry algorithms authentication broadcast encryption collision resistance complexity cryptanalysis cryptographic protocols cryptography cryptology identity privacy security

Editors and affiliations

  • Cynthia Dwork
    • 1
  1. 1.Microsoft Research 

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-37432-9
  • Online ISBN 978-3-540-37433-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349