Advances in Cryptology – EUROCRYPT 2005

24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings

  • Ronald Cramer
Conference proceedings EUROCRYPT 2005

DOI: 10.1007/b136415

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3494)

Table of contents (33 papers)

  1. Front Matter
  2. Cryptanalysis I

    1. Cryptanalysis of the Hash Functions MD4 and RIPEMD
      Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu
      Pages 1-18
    2. How to Break MD5 and Other Hash Functions
      Xiaoyun Wang, Hongbo Yu
      Pages 19-35
    3. Collisions of SHA-0 and Reduced SHA-1
      Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby
      Pages 36-57
  3. Theory I

    1. Reducing Complexity Assumptions for Statistically-Hiding Commitment
      Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel
      Pages 58-77
    2. On Robust Combiners for Oblivious Transfer and Other Primitives
      Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen
      Pages 96-113
  4. Encryption I

  5. Signatures and Authentication

    1. Secure Remote Authentication Using Biometric Data
      Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith
      Pages 147-163
    2. 3-Move Undeniable Signature Scheme
      Kaoru Kurosawa, Swee-Huay Heng
      Pages 181-197
    3. Group Signatures with Efficient Concurrent Join
      Aggelos Kiayias, Moti Yung
      Pages 198-214
  6. Algebra and Number Theory I

    1. Floating-Point LLL Revisited
      Phong Q. Nguên, Damien Stehlé
      Pages 215-233
    2. Practical Cryptography in High Dimensional Tori
      Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam et al.
      Pages 234-250
  7. Quantum Cryptography

    1. Computational Indistinguishability Between Quantum States and Its Cryptographic Application
      Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
      Pages 268-284
    2. Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
      Claude Crépeau, Daniel Gottesman, Adam Smith
      Pages 285-301
  8. Secure Protocols

    1. Compact E-Cash
      Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
      Pages 302-321
    2. Cryptographic Asynchronous Multi-party Computation with Optimal Resilience
      Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek
      Pages 322-340

About these proceedings

Introduction

These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg? ard was responsible for local organization. TheEurocrypt2005ProgramCommittee(PC)consistedof30internationally renowned experts. Their names and a?liations are listed on pages VII and VIII of these proceedings. By the November 15, 2004 submission deadline the PC had received a total of 190 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, were committed to the IACR Web Review System. These were taken as the starting point for the PC-wideWeb-baseddiscussionphase.Duringthisphase,additionalreportswere provided as needed, and the PC eventually had some 700 reports at its disposal. In addition, the discussions generated more than 850 messages, all posted in the system. During the entire PC phase, which started in August 2003 with my earliest invitations to PC members and which continued until March 2005, more than 1000 email messages were communicated. Moreover, the PC received much appreciated assistance from a large body of external reviewers. Their names are listed on page VIII of these proceedings.

Keywords

Oracle RSA Signatur authentication calculus complexity cryptanalysis cryptographic attacs cryptographic protocols cryptography cryptology data encryption privacy quantum cryptography security

Editors and affiliations

  • Ronald Cramer
    • 1
  1. 1.CWI AmsterdamThe Netherlands

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-25910-7
  • Online ISBN 978-3-540-32055-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349