Book Volume 4515 2007

Advances in Cryptology - EUROCRYPT 2007

26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings


ISBN: 978-3-540-72539-8 (Print) 978-3-540-72540-4 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Chapter

    Pages 1-22

    Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities

  3. Chapter

    Pages 23-33

    Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist

  4. Chapter

    Pages 34-51

    The Collision Intractability of MDC-2 in the Ideal-Cipher Model

  5. Chapter

    Pages 52-78

    An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

  6. Chapter

    Pages 79-96

    Revisiting the Efficiency of Malicious Two-Party Computation

  7. Chapter

    Pages 97-114

    Efficient Two-Party Secure Computation on Committed Inputs

  8. Chapter

    Pages 115-128

    Universally Composable Multi-party Computation Using Tamper-Proof Hardware

  9. Chapter

    Pages 129-147

    Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model

  10. Chapter

    Pages 148-168

    Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability

  11. Chapter

    Pages 169-186

    Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility

  12. Chapter

    Pages 187-209

    Zero Knowledge and Soundness Are Symmetric

  13. Chapter

    Pages 210-227

    Mesh Signatures

  14. Chapter

    Pages 228-245

    The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks

  15. Chapter

    Pages 246-263

    Batch Verification of Short Signatures

  16. Chapter

    Pages 264-275

    Cryptanalysis of SFLASH with Slightly Modified Parameters

  17. Chapter

    Pages 276-290

    Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy

  18. Chapter

    Pages 291-310

    Secure Computation from Random Error Correcting Codes

  19. Chapter

    Pages 311-328

    Round-Efficient Secure Computation in Point-to-Point Networks

  20. Chapter

    Pages 329-346

    Atomic Secure Multi-party Multiplication with Low Communication

  21. Chapter

    Pages 347-360

    Cryptanalysis of the Sidelnikov Cryptosystem

previous Page of 2