IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of CRYPTO 2005

Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , Springer
Efficient Collision Search Attacks on SHA-0., Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin, pp. 1-16
 PDF  postscript BibTeX
Finding Collisions in the Full SHA-1., Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, pp. 17-36
 PDF  postscript BibTeX
Pebbling and Proofs of Work., Cynthia Dwork, Moni Naor, Hoeteck Wee, pp. 37-54
 PDF  postscript BibTeX
Composition Does Not Imply Adaptive Security., Krzysztof Pietrzak, pp. 55-65
 PDF  postscript BibTeX
On the Discrete Logarithm Problem on Algebraic Tori., Robert Granger, Frederik Vercauteren, pp. 66-85
 PDF  postscript BibTeX
A Practical Attack on a Braid Group Based Cryptographic Protocol., Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov, pp. 86-96
 PDF  postscript BibTeX
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption., Yi Lu 0002, Willi Meier, Serge Vaudenay, pp. 97-117
 PDF  postscript BibTeX
Unconditional Characterizations of Non-interactive Zero-Knowledge., Rafael Pass, Abhi Shelat, pp. 118-134
 PDF  postscript BibTeX
Impossibility and Feasibility Results for Zero Knowledge with Public Keys., Joël Alwen, Giuseppe Persiano, Ivan Visconti, pp. 135-151
 PDF  postscript BibTeX
Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors., Marc Fischlin, pp. 152-168
 PDF  postscript BibTeX
A Formal Treatment of Onion Routing., Jan Camenisch, Anna Lysyanskaya, pp. 169-187
 PDF  postscript BibTeX
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy., Kun Peng, Colin Boyd, Ed Dawson, pp. 188-204
 PDF  postscript BibTeX
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions., Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi, pp. 205-222
 PDF  postscript BibTeX
Private Searching on Streaming Data., Rafail Ostrovsky, William E. Skeith III, pp. 223-240
 PDF  postscript BibTeX
Privacy-Preserving Set Operations., Lea Kissner, Dawn Xiaodong Song, pp. 241-257
 PDF  postscript BibTeX
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys., Dan Boneh, Craig Gentry, Brent Waters, pp. 258-275
 PDF  postscript BibTeX
Generic Transformation for Scalable Broadcast Encryption Schemes., Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim, pp. 276-292
 PDF  postscript BibTeX
Authenticating Pervasive Devices with Human Protocols., Ari Juels, Stephen A. Weis, pp. 293-308
 PDF  postscript BibTeX
Secure Communications over Insecure Channels Based on Short Authenticated Strings., Serge Vaudenay, pp. 309-326
 PDF  postscript BibTeX
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes., Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró, pp. 327-343
 PDF  postscript BibTeX
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields., Ronald Cramer, Serge Fehr, Martijn Stam, pp. 344-360
 PDF  postscript BibTeX
Secure Computation Without Authentication., Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin, pp. 361-377
 PDF  postscript BibTeX
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator., Ivan Damgård, Yuval Ishai, pp. 378-394
 PDF  postscript BibTeX
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems., Omer Barkol, Yuval Ishai, pp. 395-411
 PDF  postscript BibTeX
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes., Alexandra Boldyreva, Marc Fischlin, pp. 412-429
 PDF  postscript BibTeX
Merkle-Damgård Revisited: How to Construct a Hash Function., Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya, pp. 430-448
 BibTeX
On the Generic Insecurity of the Full Domain Hash., Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak, pp. 449-466
 PDF  postscript BibTeX
New Monotones and Lower Bounds in Unconditional Two-Party Computation., Stefan Wolf, Jürg Wullschleger, pp. 467-477
 PDF  postscript BibTeX
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption., Thomas Holenstein, Renato Renner, pp. 478-493
 PDF  postscript BibTeX
A Quantum Cipher with Near Optimal Key-Recycling., Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail, pp. 494-510
 PDF  postscript BibTeX
An Efficient CDH-Based Signature Scheme with a Tight Security Reduction., Benoît Chevallier-Mames, pp. 511-526
 PDF  postscript BibTeX
Improved Security Analyses for CBC MACs., Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway, pp. 527-545
 PDF  postscript BibTeX
HMQV: A High-Performance Secure Diffie-Hellman Protocol., Hugo Krawczyk, pp. 546-566
 PDF  postscript BibTeX

[ IACR home page ] © IACR