Advances in Cryptology - EUROCRYPT 2009

28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings

Editors:

ISBN: 978-3-642-01000-2 (Print) 978-3-642-01001-9 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Security, Proofs and Models (1)

    1. Book Chapter

      Pages 1-35

      Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening

    2. Book Chapter

      Pages 36-53

      Breaking RSA Generically Is Equivalent to Factoring

    3. Book Chapter

      Pages 54-71

      Resettably Secure Computation

    4. Book Chapter

      Pages 72-87

      On the Security Loss in Cryptographic Reductions

  3. Hash Cryptanalysis

    1. Book Chapter

      Pages 88-105

      On Randomizing Hash Functions to Strengthen the Security of Digital Signatures

    2. Book Chapter

      Pages 106-120

      Cryptanalysis of MDC-2

    3. Book Chapter

      Pages 121-133

      Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC

    4. Book Chapter

      Pages 134-152

      Finding Preimages in Full MD5 Faster Than Exhaustive Search

  4. Group and Broadcast Encryption

    1. Book Chapter

      Pages 153-170

      Asymmetric Group Key Agreement

    2. Book Chapter

      Pages 171-188

      Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)

    3. Book Chapter

      Pages 189-205

      Traitors Collaborating in Public: Pirates 2.0

  5. Cryptosystems (1)

    1. Book Chapter

      Pages 206-223

      Key Agreement from Close Secrets over Unsecured Channels

    2. Book Chapter

      Pages 224-241

      Order-Preserving Symmetric Encryption

    3. Book Chapter

      Pages 242-259

      A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier

  6. Cryptanalysis

    1. Book Chapter

      Pages 260-277

      On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis

    2. Book Chapter

      Pages 278-299

      Cube Attacks on Tweakable Black Box Polynomials

    3. Book Chapter

      Pages 300-312

      Smashing SQUASH-0

  7. Cryptosystems (2)

    1. Book Chapter

      Pages 313-332

      Practical Chosen Ciphertext Secure Encryption from Factoring

    2. Book Chapter

      Pages 333-350

      Realizing Hash-and-Sign Signatures under Standard Assumptions

    3. Book Chapter

      Pages 351-368

      A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks

previous Page of 2