Advances in Cryptology - EUROCRYPT 2009

28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings

  • Antoine Joux
Conference proceedings EUROCRYPT 2009

DOI: 10.1007/978-3-642-01001-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5479)

Table of contents (34 papers)

  1. Front Matter
  2. Security, Proofs and Models (1)

  3. Hash Cryptanalysis

    1. Cryptanalysis of MDC-2
      Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen
      Pages 106-120
    2. Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
      Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan
      Pages 121-133
    3. Finding Preimages in Full MD5 Faster Than Exhaustive Search
      Yu Sasaki, Kazumaro Aoki
      Pages 134-152
  4. Group and Broadcast Encryption

    1. Asymmetric Group Key Agreement
      Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer
      Pages 153-170
    2. Traitors Collaborating in Public: Pirates 2.0
      Olivier Billet, Duong Hieu Phan
      Pages 189-205
  5. Cryptosystems (1)

    1. Key Agreement from Close Secrets over Unsecured Channels
      Bhavana Kanukurthi, Leonid Reyzin
      Pages 206-223
    2. Order-Preserving Symmetric Encryption
      Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill
      Pages 224-241
  6. Cryptanalysis

    1. Cube Attacks on Tweakable Black Box Polynomials
      Itai Dinur, Adi Shamir
      Pages 278-299
    2. Smashing SQUASH-0
      Khaled Ouafi, Serge Vaudenay
      Pages 300-312
  7. Cryptosystems (2)

    1. Practical Chosen Ciphertext Secure Encryption from Factoring
      Dennis Hofheinz, Eike Kiltz
      Pages 313-332
    2. Realizing Hash-and-Sign Signatures under Standard Assumptions
      Susan Hohenberger, Brent Waters
      Pages 333-350

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009.

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 148 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on security, proofs, and models, hash cryptanalysis, group and broadcast encryption, cryptosystems, cryptanalysis, side channels, curves, and randomness.

Keywords

algebraic attacks anonymity authentication block ciphers computational number theory cryptanalysis cryptographic attacks cryptographic hash functions cryptographic protocols cryptographic systems cryptography cryptology data encryption database security

Editors and affiliations

  • Antoine Joux
    • 1
  1. 1.DGA and University of Versailles Saint-Quentin-en-YvelinesVersailles cedexFrance

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01000-2
  • Online ISBN 978-3-642-01001-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349