Proceedings of EUROCRYPT 2005
Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings
, Springer
- Cryptanalysis of the Hash Functions MD4 and RIPEMD., Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, pp. 1-18
- PDF postscript BibTeX
- How to Break MD5 and Other Hash Functions., Xiaoyun Wang, Hongbo Yu, pp. 19-35
- PDF postscript BibTeX
- Collisions of SHA-0 and Reduced SHA-1., Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby, pp. 36-57
- PDF postscript BibTeX
- Reducing Complexity Assumptions for Statistically-Hiding Commitment., Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel, pp. 58-77
- PDF postscript BibTeX
- Smooth Projective Hashing and Two-Message Oblivious Transfer., Yael Tauman Kalai, pp. 78-95
- PDF postscript BibTeX
- On Robust Combiners for Oblivious Transfer and Other Primitives., Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen, pp. 96-113
- PDF postscript BibTeX
- Efficient Identity-Based Encryption Without Random Oracles., Brent Waters, pp. 114-127
- PDF postscript BibTeX
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM., Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup, pp. 128-146
- PDF postscript BibTeX
- Secure Remote Authentication Using Biometric Data., Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith, pp. 147-163
- PDF postscript BibTeX
- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators., Daniel J. Bernstein, pp. 164-180
- PDF postscript BibTeX
- 3-Move Undeniable Signature Scheme., Kaoru Kurosawa, Swee-Huay Heng, pp. 181-197
- PDF postscript BibTeX
- Group Signatures with Efficient Concurrent Join., Aggelos Kiayias, Moti Yung, pp. 198-214
- PDF postscript BibTeX
- Floating-Point LLL Revisited., Phong Q. Nguyen, Damien Stehlé, pp. 215-233
- PDF postscript BibTeX
- Practical Cryptography in High Dimensional Tori., Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff, pp. 234-250
- PDF postscript BibTeX
- A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers., Johannes Blömer, Alexander May, pp. 251-267
- PDF postscript BibTeX
- Computational Indistinguishability Between Quantum States and Its Cryptographic Application., Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami, pp. 268-284
- PDF postscript BibTeX
- Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes., Claude Crépeau, Daniel Gottesman, Adam Smith, pp. 285-301
- PDF postscript BibTeX
- Compact E-Cash., Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya, pp. 302-321
- PDF postscript BibTeX
- Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract)., Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek, pp. 322-340
- PDF postscript BibTeX
- Differential Cryptanalysis for Multivariate Schemes., Pierre-Alain Fouque, Louis Granboulan, Jacques Stern, pp. 341-353
- PDF postscript BibTeX
- A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem., Ludovic Perret, pp. 354-370
- PDF postscript BibTeX
- Partial Key Exposure Attacks on RSA up to Full Size Exponents., Matthias Ernst, Ellen Jochemsz, Alexander May, Benne de Weger, pp. 371-386
- PDF postscript BibTeX
- The RSA Group is Pseudo-Free., Daniele Micciancio, pp. 387-403
- PDF postscript BibTeX
- Universally Composable Password-Based Key Exchange., Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie, pp. 404-421
- PDF postscript BibTeX
- Mercurial Commitments with Applications to Zero-Knowledge Sets., Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin, pp. 422-439
- PDF postscript BibTeX
- Hierarchical Identity Based Encryption with Constant Size Ciphertext., Dan Boneh, Xavier Boyen, Eu-Jin Goh, pp. 440-456
- PDF postscript BibTeX
- Fuzzy Identity-Based Encryption., Amit Sahai, Brent Waters, pp. 457-473
- PDF postscript BibTeX
- Second Preimages on n-Bit Hash Functions for Much Less than 2n Work., John Kelsey, Bruce Schneier, pp. 474-490
- PDF postscript BibTeX
- Predicting and Distinguishing Attacks on RC4 Keystream Generator., Itsik Mantin, pp. 491-506
- PDF postscript BibTeX
- Related-Key Boomerang and Rectangle Attacks., Eli Biham, Orr Dunkelman, Nathan Keller, pp. 507-525
- PDF postscript BibTeX
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions., John Black, Martin Cochran, Thomas Shrimpton, pp. 526-541
- PDF postscript BibTeX
- Public Traceability in Traitor Tracing Schemes., Hervé Chabanne, Duong Hieu Phan, David Pointcheval, pp. 542-558
- PDF postscript BibTeX
- One-Way Chain Based Broadcast Encryption Schemes., Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo, pp. 559-574
- PDF postscript BibTeX
[ IACR home page ]
© IACR