Advances in Cryptology ¿ EUROCRYPT 2007

26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings

Omschrijving

This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007.The 33 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007. The 33 revised full papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities 1 Marc Stevens, Arjen Lenstra, and Benne de Weyer Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist 23 Krzysztof Pietrzak The Collision Intractability of MDC-2 in the Ideal-Cipher Model 34 John P. Steinberger An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries 52 Yehuda Lindell and Benny Pinkas Revisiting the Efficiency of Malicious Two-Party Computation 79 David P. Woodruff Efficient Two-Party Secure Computation on Committed Inputs 97 Stanislaw Jarecki and Vitaly Shmatikov Universally Composable Multi-party Computation Using Tamper-Proof Hardware 115 Jonathan Katz Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model 129 Moti Yung and Yunlei Zhao Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability 148 Yi Deng and Dongdai Lin Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility 169 Chun- Yuan Hsiao, Chi-Jen Lu, and Leonid Reyzin Zero Knowledge and Soundness Are Symmetric 187 Shien Jin Ong and Salil Vadhan Mesh Signatures 210 Xavier Boyen The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks 228 Thomas Ristenpart and Scott Yilek Batch Verification of Short Signatures 246 Jan Camenisch, Susan Hohenberger, and Michael tergaard Pedersen Cryptanalysis of SFLASH with Slightly Modified Parameters 264 Vivien Dubois, Pierre-Alain Fouque, and Jacques Stern Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy 276 Hongjun Wu and Bart Preneel Secure Computation from Random Error Correcting Codes 291 Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, and Vinod Vaikuntanathan Round-Efficient Secure Computation in Point-to-Point Networks 311 Jonathan Katz and Chiu- Yuen Koo Atomic Secure Multi-party Multiplication with Low Communication 329 Ronald Cramer, Ivan Damg , and Robbert de Haan Cryptanalysis of the Sidelnikov Cryptosystem 347 Lorenz Minder and Amin Shokrollahi Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables 361 Aur e Bauer and Antoine Joux An L(1/3 + epsilon) Algorithm for the Discrete Logarithm Problem for Low Degree Curves 379 Andreas Enge and Pierrick Gaudry General Ad Hoc Encryption from Exponent Inversion IBE 394 Xavier Boyers Non-interactive Proofs for Integer Multiplication 412 Ivan Damg and Rune Thorbek Ate Pairing on Hyperelliptic Curves 430 Robert Granger, Florian Hess, Roger Oyono, Nicolas Th ault, and Frederik Vercauteren Ideal Multipartite Secret Sharing Schemes 448 Oriol Farr Jaume Marti-Farr and Carles Padr Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit 466 Willi Geiselmann and Rainer Steinwandt Divisible E-Cash Systems Can Be Truly Anonymous 482 S stien Canard and Aline Gouget Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security 498 Ueli Maurer and Johan Sj din Range Extension for Weak PRFs; The Good, the Bad, and the Ugly 517 Krzysztof Pietrzak and Johan Sj din Vristel Networks Made Public, and Applications 534 Yevgeniy Dodis and Prashant Puniya Hdivious-Transfer Amplification 555 J rg Wullschleger Stilulatable Adaptive Oblivious Transfer 573 Jan Camenisch, Gregory Neven, and abhi shelat Author Index 591
€ 63,00
Paperback
 
Gratis verzending vanaf
€ 19,95 binnen Nederland
Schrijver
Titel
Advances in Cryptology ¿ EUROCRYPT 2007
Uitgever
Springer-Verlag GmbH
Jaar
2007
Taal
Engels
Pagina's
608
Gewicht
907 gr
EAN
9783540725398
Afmetingen
229 x 152 x 32 mm
Bindwijze
Paperback

U ontvangt bij ons altijd de laatste druk!


Rubrieken

Boekstra