EUROCRYPT 2008:
Istanbul, Turkey Nigel P. Smart (Ed.): Advances in Cryptology - EUROCRYPT 2008,27th Annual International Conference on the Theory and Applications of Cryptographic Techniques,
Istanbul, Turkey,
April 13-17, 2008.
Proceedings.
A Practical Attack on KeeLoq. 1-18
Key Recovery on Hidden Monomial Multivariate Schemes. 19-30
Predicting Lattice Reduction. 31-51
Efficient Sequential Aggregate Signed Data. 52-69
Proving Tight Security for Rabin-Williams Signatures. 70-87
Threshold RSA for Dynamic and Ad-Hoc Groups. 88-107
Towards Key-Dependent Message Security in the Standard Model. 108-126
The Twin Diffie-Hellman Problem and Applications. 127-145
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. 146-162
Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves. 163-180
On the Indifferentiability of the Sponge Construction. 181-197
A New Mode of Operation for Block Ciphers and Length-Preserving MACs. 198-219
Security/Efficiency Tradeoffs for Permutation-Based Hashing. 220-236
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. 237-253
Collisions for the LPS Expander Graph Hash Function. 254-269
Second Preimage Attacks on Dithered Hash Functions. 270-288
Efficient Two Party and Multi Party Computation Against Covert Adversaries. 289-306
Almost-Everywhere Secure Computation. 307-323
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme. 324-340
Protocols and Lower Bounds for Failure Localization in the Internet. 341-360
HB # : Increasing the Security and Efficiency of HB + . 361-378
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle. 379-396
Precise Concurrent Zero Knowledge. 397-414
Efficient Non-interactive Proof Systems for Bilinear Groups. 415-432
Zero-Knowledge Sets with Short Proofs. 433-450
Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves. 451-470
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. 471-488
Obfuscating Point Functions with Multibit Output. 489-508
Isolated Proofs of Knowledge and Isolated Zero Knowledge. 509-526
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware. 527-544
New Constructions for UC Secure Computation Using Tamper-Proof Hardware. 545-562
Copyright © Fri Oct 29 16:57:42 2010 by Michael Ley ( ley@uni-trier.de )