Proceedings of CRYPTO 2005
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings
, Springer
- Efficient Collision Search Attacks on SHA-0., Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin, pp. 1-16
- PDF postscript BibTeX
- Finding Collisions in the Full SHA-1., Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, pp. 17-36
- PDF postscript BibTeX
- Pebbling and Proofs of Work., Cynthia Dwork, Moni Naor, Hoeteck Wee, pp. 37-54
- PDF postscript BibTeX
- Composition Does Not Imply Adaptive Security., Krzysztof Pietrzak, pp. 55-65
- PDF postscript BibTeX
- On the Discrete Logarithm Problem on Algebraic Tori., Robert Granger, Frederik Vercauteren, pp. 66-85
- PDF postscript BibTeX
- A Practical Attack on a Braid Group Based Cryptographic Protocol., Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov, pp. 86-96
- PDF postscript BibTeX
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption., Yi Lu 0002, Willi Meier, Serge Vaudenay, pp. 97-117
- PDF postscript BibTeX
- Unconditional Characterizations of Non-interactive Zero-Knowledge., Rafael Pass, Abhi Shelat, pp. 118-134
- PDF postscript BibTeX
- Impossibility and Feasibility Results for Zero Knowledge with Public Keys., Joël Alwen, Giuseppe Persiano, Ivan Visconti, pp. 135-151
- PDF postscript BibTeX
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors., Marc Fischlin, pp. 152-168
- PDF postscript BibTeX
- A Formal Treatment of Onion Routing., Jan Camenisch, Anna Lysyanskaya, pp. 169-187
- PDF postscript BibTeX
- Simple and Efficient Shuffling with Provable Correctness and ZK Privacy., Kun Peng, Colin Boyd, Ed Dawson, pp. 188-204
- PDF postscript BibTeX
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions., Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi, pp. 205-222
- PDF postscript BibTeX
- Private Searching on Streaming Data., Rafail Ostrovsky, William E. Skeith III, pp. 223-240
- PDF postscript BibTeX
- Privacy-Preserving Set Operations., Lea Kissner, Dawn Xiaodong Song, pp. 241-257
- PDF postscript BibTeX
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys., Dan Boneh, Craig Gentry, Brent Waters, pp. 258-275
- PDF postscript BibTeX
- Generic Transformation for Scalable Broadcast Encryption Schemes., Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim, pp. 276-292
- PDF postscript BibTeX
- Authenticating Pervasive Devices with Human Protocols., Ari Juels, Stephen A. Weis, pp. 293-308
- PDF postscript BibTeX
- Secure Communications over Insecure Channels Based on Short Authenticated Strings., Serge Vaudenay, pp. 309-326
- PDF postscript BibTeX
- On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes., Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró, pp. 327-343
- PDF postscript BibTeX
- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields., Ronald Cramer, Serge Fehr, Martijn Stam, pp. 344-360
- PDF postscript BibTeX
- Secure Computation Without Authentication., Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin, pp. 361-377
- PDF postscript BibTeX
- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator., Ivan Damgård, Yuval Ishai, pp. 378-394
- PDF postscript BibTeX
- Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems., Omer Barkol, Yuval Ishai, pp. 395-411
- PDF postscript BibTeX
- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes., Alexandra Boldyreva, Marc Fischlin, pp. 412-429
- PDF postscript BibTeX
- Merkle-Damgård Revisited: How to Construct a Hash Function., Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya, pp. 430-448
- BibTeX
- On the Generic Insecurity of the Full Domain Hash., Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak, pp. 449-466
- PDF postscript BibTeX
- New Monotones and Lower Bounds in Unconditional Two-Party Computation., Stefan Wolf, Jürg Wullschleger, pp. 467-477
- PDF postscript BibTeX
- One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption., Thomas Holenstein, Renato Renner, pp. 478-493
- PDF postscript BibTeX
- A Quantum Cipher with Near Optimal Key-Recycling., Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail, pp. 494-510
- PDF postscript BibTeX
- An Efficient CDH-Based Signature Scheme with a Tight Security Reduction., Benoît Chevallier-Mames, pp. 511-526
- PDF postscript BibTeX
- Improved Security Analyses for CBC MACs., Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway, pp. 527-545
- PDF postscript BibTeX
- HMQV: A High-Performance Secure Diffie-Hellman Protocol., Hugo Krawczyk, pp. 546-566
- PDF postscript BibTeX
[ IACR home page ]
© IACR