Advances in Cryptology – EUROCRYPT 2005

24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings


ISBN: 978-3-540-25910-7 (Print) 978-3-540-32055-5 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis I

    1. Book Chapter

      Pages 1-18

      Cryptanalysis of the Hash Functions MD4 and RIPEMD

    2. Book Chapter

      Pages 19-35

      How to Break MD5 and Other Hash Functions

    3. Book Chapter

      Pages 36-57

      Collisions of SHA-0 and Reduced SHA-1

  3. Theory I

    1. Book Chapter

      Pages 58-77

      Reducing Complexity Assumptions for Statistically-Hiding Commitment

    2. Book Chapter

      Pages 78-95

      Smooth Projective Hashing and Two-Message Oblivious Transfer

    3. Book Chapter

      Pages 96-113

      On Robust Combiners for Oblivious Transfer and Other Primitives

  4. Encryption I

    1. Book Chapter

      Pages 114-127

      Efficient Identity-Based Encryption Without Random Oracles

    2. Book Chapter

      Pages 128-146

      Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM

  5. Signatures and Authentication

    1. Book Chapter

      Pages 147-163

      Secure Remote Authentication Using Biometric Data

    2. Book Chapter

      Pages 164-180

      Stronger Security Bounds for Wegman-Carter-Shoup Authenticators

    3. Book Chapter

      Pages 181-197

      3-Move Undeniable Signature Scheme

    4. Book Chapter

      Pages 198-214

      Group Signatures with Efficient Concurrent Join

  6. Algebra and Number Theory I

    1. Book Chapter

      Pages 215-233

      Floating-Point LLL Revisited

    2. Book Chapter

      Pages 234-250

      Practical Cryptography in High Dimensional Tori

    3. Book Chapter

      Pages 251-267

      A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers

  7. Quantum Cryptography

    1. Book Chapter

      Pages 268-284

      Computational Indistinguishability Between Quantum States and Its Cryptographic Application

    2. Book Chapter

      Pages 285-301

      Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes

  8. Secure Protocols

    1. Book Chapter

      Pages 302-321

      Compact E-Cash

    2. Book Chapter

      Pages 322-340

      Cryptographic Asynchronous Multi-party Computation with Optimal Resilience

  9. Algebra and Number Theory II

    1. Book Chapter

      Pages 341-353

      Differential Cryptanalysis for Multivariate Schemes

previous Page of 2