25. CRYPTO 2005:
Santa Barbara,
California,
USA
Victor Shoup (Ed.):
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings.
Lecture Notes in Computer Science 3621 Springer 2005, ISBN 3-540-28114-2 BibTeX
- Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin:
Efficient Collision Search Attacks on SHA-0.
1-16
Electronic Edition (link) BibTeX
- Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu:
Finding Collisions in the Full SHA-1.
17-36
Electronic Edition (link) BibTeX
- Cynthia Dwork, Moni Naor, Hoeteck Wee:
Pebbling and Proofs of Work.
37-54
Electronic Edition (link) BibTeX
- Krzysztof Pietrzak:
Composition Does Not Imply Adaptive Security.
55-65
Electronic Edition (link) BibTeX
- Robert Granger, Frederik Vercauteren:
On the Discrete Logarithm Problem on Algebraic Tori.
66-85
Electronic Edition (link) BibTeX
- Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov:
A Practical Attack on a Braid Group Based Cryptographic Protocol.
86-96
Electronic Edition (link) BibTeX
- Yi Lu, Willi Meier, Serge Vaudenay:
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption.
97-117
Electronic Edition (link) BibTeX
- Rafael Pass, Abhi Shelat:
Unconditional Characterizations of Non-interactive Zero-Knowledge.
118-134
Electronic Edition (link) BibTeX
- Joël Alwen, Giuseppe Persiano, Ivan Visconti:
Impossibility and Feasibility Results for Zero Knowledge with Public Keys.
135-151
Electronic Edition (link) BibTeX
- Marc Fischlin:
Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors.
152-168
Electronic Edition (link) BibTeX
- Jan Camenisch, Anna Lysyanskaya:
A Formal Treatment of Onion Routing.
169-187
Electronic Edition (link) BibTeX
- Kun Peng, Colin Boyd, Ed Dawson:
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy.
188-204
Electronic Edition (link) BibTeX
- Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
205-222
Electronic Edition (link) BibTeX
- Rafail Ostrovsky, William E. Skeith III:
Private Searching on Streaming Data.
223-240
Electronic Edition (link) BibTeX
- Lea Kissner, Dawn Xiaodong Song:
Privacy-Preserving Set Operations.
241-257
Electronic Edition (link) BibTeX
- Dan Boneh, Craig Gentry, Brent Waters:
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
258-275
Electronic Edition (link) BibTeX
- Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim:
Generic Transformation for Scalable Broadcast Encryption Schemes.
276-292
Electronic Edition (link) BibTeX
- Ari Juels, Stephen A. Weis:
Authenticating Pervasive Devices with Human Protocols.
293-308
Electronic Edition (link) BibTeX
- Serge Vaudenay:
Secure Communications over Insecure Channels Based on Short Authenticated Strings.
309-326
Electronic Edition (link) BibTeX
- Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes.
327-343
Electronic Edition (link) BibTeX
- Ronald Cramer, Serge Fehr, Martijn Stam:
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields.
344-360
Electronic Edition (link) BibTeX
- Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin:
Secure Computation Without Authentication.
361-377
Electronic Edition (link) BibTeX
- Ivan Damgård, Yuval Ishai:
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator.
378-394
Electronic Edition (link) BibTeX
- Omer Barkol, Yuval Ishai:
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems.
395-411
Electronic Edition (link) BibTeX
- Alexandra Boldyreva, Marc Fischlin:
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
412-429
Electronic Edition (link) BibTeX
- Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya:
Merkle-Damgård Revisited: How to Construct a Hash Function.
430-448
Electronic Edition (link) BibTeX
- Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak:
On the Generic Insecurity of the Full Domain Hash.
449-466
Electronic Edition (link) BibTeX
- Stefan Wolf, Jürg Wullschleger:
New Monotones and Lower Bounds in Unconditional Two-Party Computation.
467-477
Electronic Edition (link) BibTeX
- Thomas Holenstein, Renato Renner:
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption.
478-493
Electronic Edition (link) BibTeX
- Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail:
A Quantum Cipher with Near Optimal Key-Recycling.
494-510
Electronic Edition (link) BibTeX
- Benoît Chevallier-Mames:
An Efficient CDH-Based Signature Scheme with a Tight Security Reduction.
511-526
Electronic Edition (link) BibTeX
- Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway:
Improved Security Analyses for CBC MACs.
527-545
Electronic Edition (link) BibTeX
- Hugo Krawczyk:
HMQV: A High-Performance Secure Diffie-Hellman Protocol.
546-566
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:03:55 2009
by Michael Ley (ley@uni-trier.de)