EUROCRYPT 2005: Aarhus, Denmark
Ronald Cramer (Ed.): Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings.Preface , by Ronald Cramer
May 22--26, 2005, Aarhus, DenmarkSponsored by the
International Association for Cryptologic Research (IACR)
in cooperation with the
Computer Science Department, Faculty of Science,
University of Aarhus, Denmark
General Chair
Ivan Damgård, Department of Computer Science, University of Aarhus, Denmark
Program Chair
Ronald Cramer, CWI, Amsterdam & Mathematical Institute, Leiden University, The Netherlands
Program Committee
Michael Backes | IBM Zürich Research Laboratory, Switzerland |
Daniel Bleichenbacher | Lucent Bell Labs, USA |
Don Beaver | Syntechnica, LLC, USA |
Don Coppersmith | IBM T. J. Watson Research Center, USA |
Hans Dobbertin | University of Bochum, Germany |
Yevgeniy Dodis | New York University, USA |
Marc Fischlin | ETH Zürich, Switzerland |
Steven Galbraith | Royal Holloway, University of London, UK |
Shafi Goldwasser | MIT, USA & Weizmann Institute of Science, Israel |
Shai Halevi | IBM T. J. Watson Research Center, USA |
Johan Håstad | Royal Institute of Technology, UK |
Marc Joye | Gemplus, France |
Aggelos Kiayias | University of Connecticut, USA |
Eyal Kushilevitz | Technion, Israel |
Arjen Lenstra | Lucent Bell Labs, USA & TU Eindhoven, The Netherlands |
Phong Q. Nguyên | CNRS & École normale supérieure, France |
Kaisa Nyberg | Nokia, Finland |
Tatsuaki Okamoto | NTT, Japan |
Rafail Ostrovsky | U.C.L.A., USA |
Carles Padréo | Universitat Politècnica de Catalunya, Spain |
Benny Pinkas | Hewlett-Packard Labs, Israel |
Bart Preneel | Katholieke Universiteit Leuven, Belgium |
Louis Salvail | University of Aarhus, Denmark |
Palash Sarkar | Indian Statistical Institute, India |
Berry Schoenmakers | TU Eindhoven, The Netherlands |
Igor Shparlinski | Macquarie University, Australia |
Douglas Stinson | University of Waterloo, Canada |
Salil Vadhan | Harvard University, USA |
Moti Yung | Columbia University, USA |
External Reviewers
Cryptanalysis I
-
Xiaoyun Wang
,
Xuejia Lai
,
Dengguo Feng
,
Hui Chen
,
Xiuyuan Yu
:
Cryptanalysis of the Hash Functions MD4 and RIPEMD ,( .ps ) BibTeX -
Xiaoyun Wang
,
Hongbo Yu
:
How to Break MD5 and Other Hash Functions . 19-35
BibTeX -
Eli Biham
,
Rafi Chen
,
Antoine Joux
,
Patrick Carribault
,
Christophe Lemuet
,
William Jalby
:
Collisions of SHA-0 and Reduced SHA-1 , ( ps ) 36-57
BibTeX
Theory I
-
Iftach Haitner
,
Omer Horvitz
,
Jonathan Katz
,
Chiu-Yuen Koo
,
Ruggero Morselli
,
Ronen Shaltiel
:
Reducing Complexity Assumptions for Statistically-Hiding Commitment , ( ps ) 58-77
BibTeX -
Yael Tauman Kalai
:
Smooth Projective Hashing and Two-Message Oblivious Transfer , ( ps ) 78-95
BibTeX -
Danny Harnik
,
Joe Kilian
,
Moni Naor
,
Omer Reingold
,
Alon Rosen
:
On Robust Combiners for Oblivious Transfer and Other Primitives , ( ps ) 96-113
BibTeX
Encryption I
-
Brent Waters
:
Efficient Identity-Based Encryption Without Random Oracles , ( ps ) 114-127
BibTeX -
Masayuki Abe
,
Rosario Gennaro
,
Kaoru Kurosawa
,
Victor Shoup
:
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM , ( ps ) 128-146
BibTeX
Signatures and Authentication
-
Xavier Boyen
,
Yevgeniy Dodis
,
Jonathan Katz
,
Rafail Ostrovsky
,
Adam Smith
:
Secure Remote Authentication Using Biometric Data , ( ps ) 147-163
BibTeX -
Daniel J. Bernstein
:
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators , ( ps ) 164-180
BibTeX -
Kaoru Kurosawa
,
Swee-Huay Heng
:
3-Move Undeniable Signature Scheme , ( ps ) 181-197
BibTeX -
Aggelos Kiayias
,
Moti Yung
:
Group Signatures with Efficient Concurrent Join , ( ps ) 198-214
BibTeX
Algebra and Number Theory I
-
Phong Q. Nguyen
,
Damien Stehlé
:
Floating-Point LLL Revisited , ( ps ) 215-233
BibTeX -
Marten van Dijk
,
Robert Granger
,
Dan Page
,
Karl Rubin
,
Alice Silverberg
,
Martijn Stam
,
David P. Woodruff
:
Practical Cryptography in High Dimensional Tori , ( ps ) 234-250
BibTeX -
Johannes Blömer
,
Alexander May
:
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers , ( ps ) 251-267
BibTeX
Quantum Cryptography
-
Akinori Kawachi
,
Takeshi Koshiba
,
Harumichi Nishimura
,
Tomoyuki Yamakami
:
Computational Indistinguishability Between Quantum States and Its Cryptographic Application , ( ps ) 268-284
BibTeX -
Claude Crépeau
,
Daniel Gottesman
,
Adam Smith
:
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes , ( ps ) 285-301
BibTeX
Secure Protocols
-
Jan Camenisch
,
Susan Hohenberger
,
Anna Lysyanskaya
:
Compact E-Cash , ( ps ) 302-321
BibTeX -
Martin Hirt
,
Jesper Buus Nielsen
,
Bartosz Przydatek
:
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract) , ( ps ) 322-340
BibTeX
Algebra and Number Theory II
-
Pierre-Alain Fouque
,
Louis Granboulan
,
Jacques Stern
:
Differential Cryptanalysis for Multivariate Schemes , ( ps ) 341-353
BibTeX -
Ludovic Perret
:
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem , ( ps ) 354-370
BibTeX -
Matthias Ernst
,
Ellen Jochemsz
,
Alexander May
,
Benne de Weger
:
Partial Key Exposure Attacks on RSA up to Full Size Exponents , ( ps ) 371-386
BibTeX -
Daniele Micciancio
:
The RSA Group is Pseudo-Free , ( ps ) 387-403
BibTeX
Theory II
-
Ran Canetti
,
Shai Halevi
,
Jonathan Katz
,
Yehuda Lindell
,
Philip D. MacKenzie
:
Universally Composable Password-Based Key Exchange , ( ps ) 404-421
BibTeX -
Melissa Chase
,
Alexander Healy
,
Anna Lysyanskaya
,
Tal Malkin
,
Leonid Reyzin
:
Mercurial Commitments with Applications to Zero-Knowledge Sets , ( ps ) 422-439
BibTeX
Encryption II
-
Dan Boneh
,
Xavier Boyen
,
Eu-Jin Goh
:
Hierarchical Identity Based Encryption with Constant Size Ciphertext , ( ps ) 440-456
BibTeX -
Amit Sahai
,
Brent Waters
:
Fuzzy Identity-Based Encryption , ( ps ) 457-473
BibTeX
Cryptanalysis II
-
John Kelsey
,
Bruce Schneier
:
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work , ( ps ) 474-490
BibTeX -
Itsik Mantin
:
Predicting and Distinguishing Attacks on RC4 Keystream Generator , ( ps ) 491-506
BibTeX -
Eli Biham
,
Orr Dunkelman
,
Nathan Keller
:
Related-Key Boomerang and Rectangle Attacks , ( ps ) 507-525
BibTeX -
John Black
,
Martin Cochran
,
Thomas Shrimpton
:
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions , ( ps ) 526-541
BibTeX
Broadcast Encryption and Traitor Tracing
-
Hervé Chabanne
,
Duong Hieu Phan
,
David Pointcheval
:
Public Traceability in Traitor Tracing Schemes , ( ps ) 542-558
BibTeX -
Nam-Su Jho
,
Jung Yeon Hwang
,
Jung Hee Cheon
,
Myung-Hwan Kim
,
Dong Hoon Lee
,
Eun Sun Yoo
:
One-Way Chain Based Broadcast Encryption Schemes , ( ps ) 559-574
BibTeX