Advances in Cryptology - CRYPTO 2009

29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings


ISBN: 978-3-642-03355-1 (Print) 978-3-642-03356-8 (Online)

Table of contents (39 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Key Leakage

    1. Book Chapter

      Pages 1-17

      Reconstructing RSA Private Keys from Random Key Bits

    2. Book Chapter

      Pages 18-35

      Public-Key Cryptosystems Resilient to Key Leakage

    3. Book Chapter

      Pages 36-54

      Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model

  3. Hash-Function Cryptanalysis

    1. Book Chapter

      Pages 55-69

      Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate

    2. Book Chapter

      Pages 70-89

      Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1

  4. Privacy and Anonymity

    1. Book Chapter

      Pages 90-107

      Private Mutual Authentication and Conditional Oblivious Transfer

    2. Book Chapter

      Pages 108-125

      Randomizable Proofs and Delegatable Anonymous Credentials

    3. Book Chapter

      Pages 126-142

      Computational Differential Privacy

  5. Interactive Proofs and Zero-Knowledge

    1. Book Chapter

      Pages 143-159

      Probabilistically Checkable Arguments

    2. Book Chapter

      Pages 160-176

      On the Composition of Public-Coin Zero-Knowledge Protocols

    3. Book Chapter

      Pages 177-191

      On the Amortized Complexity of Zero-Knowledge Protocols

    4. Book Chapter

      Pages 192-208

      Linear Algebra with Sub-linear Zero-Knowledge Arguments

  6. Block-Cipher Cryptanalysis

    1. Book Chapter

      Pages 209-230

      New Birthday Attacks on Some MACs Based on Block Ciphers

    2. Book Chapter

      Pages 231-249

      Distinguisher and Related-Key Attack on the Full AES-256

    3. Book Chapter

      Pages 250-266

      Cryptanalysis of C2

  7. Modes of Operation

    1. Book Chapter

      Pages 267-285

      Message Authentication Codes from Unpredictable Block Ciphers

    2. Book Chapter

      Pages 286-302

      How to Encipher Messages on a Small Domain

  8. Elliptic Curves

    1. Book Chapter

      Pages 303-316

      How to Hash into Elliptic Curves

    2. Book Chapter

      Pages 317-336

      Batch Binary Edwards

  9. Cryptographic Hardness

    1. Book Chapter

      Pages 337-354

      Solving Hidden Number Problem with One Bit Oracle and Advice

previous Page of 2