Book Volume 4965 2008

Advances in Cryptology – EUROCRYPT 2008

27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings


ISBN: 978-3-540-78966-6 (Print) 978-3-540-78967-3 (Online)

Table of contents (31 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Chapter

    Pages 1-18

    A Practical Attack on KeeLoq

  3. Chapter

    Pages 19-30

    Key Recovery on Hidden Monomial Multivariate Schemes

  4. Chapter

    Pages 31-51

    Predicting Lattice Reduction

  5. Chapter

    Pages 52-69

    Efficient Sequential Aggregate Signed Data

  6. Chapter

    Pages 70-87

    Proving Tight Security for Rabin-Williams Signatures

  7. Chapter

    Pages 88-107

    Threshold RSA for Dynamic and Ad-Hoc Groups

  8. Chapter

    Pages 108-126

    Towards Key-Dependent Message Security in the Standard Model

  9. Chapter

    Pages 127-145

    The Twin Diffie-Hellman Problem and Applications

  10. Chapter

    Pages 146-162

    Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products

  11. Chapter

    Pages 163-180

    Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves

  12. Chapter

    Pages 181-197

    On the Indifferentiability of the Sponge Construction

  13. Chapter

    Pages 198-219

    A New Mode of Operation for Block Ciphers and Length-Preserving MACs

  14. Chapter

    Pages 220-236

    Security/Efficiency Tradeoffs for Permutation-Based Hashing

  15. Chapter

    Pages 237-253

    New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5

  16. Chapter

    Pages 254-269

    Collisions for the LPS Expander Graph Hash Function

  17. Chapter

    Pages 270-288

    Second Preimage Attacks on Dithered Hash Functions

  18. Chapter

    Pages 289-306

    Efficient Two Party and Multi Party Computation Against Covert Adversaries

  19. Chapter

    Pages 307-323

    Almost-Everywhere Secure Computation

  20. Chapter

    Pages 324-340

    Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme

  21. Chapter

    Pages 341-360

    Protocols and Lower Bounds for Failure Localization in the Internet

previous Page of 2