Advances in Cryptology - CRYPTO 2007

27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings

  • Editors
  • Alfred Menezes
Conference proceedings CRYPTO 2007

DOI: 10.1007/978-3-540-74143-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4622)

Table of contents (34 papers)

  1. Front Matter
  2. Cryptanalysis I

    1. Practical Cryptanalysis of SFLASH
      Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
      Pages 1-12
    2. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
      Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen
      Pages 13-30
  3. Secure Searching

    1. How Should We Solve Search Problems Privately?
      Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb
      Pages 31-49
    2. Public Key Encryption That Allows PIR Queries
      Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
      Pages 50-67
  4. Invited Talk

    1. Information Security Economics – and Beyond
      Ross Anderson, Tyler Moore
      Pages 68-91
  5. Theory I

    1. Cryptography with Constant Input Locality
      Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
      Pages 92-110
    2. Universally-Composable Two-Party Computation in Two Rounds
      Omer Horvitz, Jonathan Katz
      Pages 111-129
    3. Indistinguishability Amplification
      Ueli Maurer, Krzysztof Pietrzak, Renato Renner
      Pages 130-149
  6. Lattices

  7. Random Oracles

  8. Hash Functions

    1. Hash Functions and the (Amplified) Boomerang Attack
      Antoine Joux, Thomas Peyrin
      Pages 244-263
    2. Amplifying Collision Resistance: A Complexity-Theoretic Treatment
      Ran Canetti, Ron Rivest, Madhu Sudan, Luca Trevisan, Salil Vadhan, Hoeteck Wee
      Pages 264-283
  9. Theory II

    1. How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
      Danny Harnik, Yuval Ishai, Eyal Kushilevitz
      Pages 284-302
    2. Simulatable VRFs with Applications to Multi-theorem NIZK
      Melissa Chase, Anna Lysyanskaya
      Pages 303-322
    3. Cryptography in the Multi-string Model
      Jens Groth, Rafail Ostrovsky
      Pages 323-341
  10. Quantum Cryptography

    1. Secure Identification and QKD in the Bounded-Quantum-Storage Model
      Ivan B. Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
      Pages 342-359

About these proceedings


Information RSA algebraic geometry algorithms authentication broadcast encryption calculus collision resistance complexity analysis cryptography cryptology data security database security digital signatures security

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-74142-8
  • Online ISBN 978-3-540-74143-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349