IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of EUROCRYPT 2005

Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , Springer
Cryptanalysis of the Hash Functions MD4 and RIPEMD., Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, pp. 1-18
 PDF  postscript BibTeX
How to Break MD5 and Other Hash Functions., Xiaoyun Wang, Hongbo Yu, pp. 19-35
 PDF  postscript BibTeX
Collisions of SHA-0 and Reduced SHA-1., Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby, pp. 36-57
 PDF  postscript BibTeX
Reducing Complexity Assumptions for Statistically-Hiding Commitment., Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel, pp. 58-77
 PDF  postscript BibTeX
Smooth Projective Hashing and Two-Message Oblivious Transfer., Yael Tauman Kalai, pp. 78-95
 PDF  postscript BibTeX
On Robust Combiners for Oblivious Transfer and Other Primitives., Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen, pp. 96-113
 PDF  postscript BibTeX
Efficient Identity-Based Encryption Without Random Oracles., Brent Waters, pp. 114-127
 PDF  postscript BibTeX
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM., Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup, pp. 128-146
 PDF  postscript BibTeX
Secure Remote Authentication Using Biometric Data., Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith, pp. 147-163
 PDF  postscript BibTeX
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators., Daniel J. Bernstein, pp. 164-180
 PDF  postscript BibTeX
3-Move Undeniable Signature Scheme., Kaoru Kurosawa, Swee-Huay Heng, pp. 181-197
 PDF  postscript BibTeX
Group Signatures with Efficient Concurrent Join., Aggelos Kiayias, Moti Yung, pp. 198-214
 PDF  postscript BibTeX
Floating-Point LLL Revisited., Phong Q. Nguyen, Damien Stehlé, pp. 215-233
 PDF  postscript BibTeX
Practical Cryptography in High Dimensional Tori., Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff, pp. 234-250
 PDF  postscript BibTeX
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers., Johannes Blömer, Alexander May, pp. 251-267
 PDF  postscript BibTeX
Computational Indistinguishability Between Quantum States and Its Cryptographic Application., Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami, pp. 268-284
 PDF  postscript BibTeX
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes., Claude Crépeau, Daniel Gottesman, Adam Smith, pp. 285-301
 PDF  postscript BibTeX
Compact E-Cash., Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya, pp. 302-321
 PDF  postscript BibTeX
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract)., Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek, pp. 322-340
 PDF  postscript BibTeX
Differential Cryptanalysis for Multivariate Schemes., Pierre-Alain Fouque, Louis Granboulan, Jacques Stern, pp. 341-353
 PDF  postscript BibTeX
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem., Ludovic Perret, pp. 354-370
 PDF  postscript BibTeX
Partial Key Exposure Attacks on RSA up to Full Size Exponents., Matthias Ernst, Ellen Jochemsz, Alexander May, Benne de Weger, pp. 371-386
 PDF  postscript BibTeX
The RSA Group is Pseudo-Free., Daniele Micciancio, pp. 387-403
 PDF  postscript BibTeX
Universally Composable Password-Based Key Exchange., Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie, pp. 404-421
 PDF  postscript BibTeX
Mercurial Commitments with Applications to Zero-Knowledge Sets., Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin, pp. 422-439
 PDF  postscript BibTeX
Hierarchical Identity Based Encryption with Constant Size Ciphertext., Dan Boneh, Xavier Boyen, Eu-Jin Goh, pp. 440-456
 PDF  postscript BibTeX
Fuzzy Identity-Based Encryption., Amit Sahai, Brent Waters, pp. 457-473
 PDF  postscript BibTeX
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work., John Kelsey, Bruce Schneier, pp. 474-490
 PDF  postscript BibTeX
Predicting and Distinguishing Attacks on RC4 Keystream Generator., Itsik Mantin, pp. 491-506
 PDF  postscript BibTeX
Related-Key Boomerang and Rectangle Attacks., Eli Biham, Orr Dunkelman, Nathan Keller, pp. 507-525
 PDF  postscript BibTeX
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions., John Black, Martin Cochran, Thomas Shrimpton, pp. 526-541
 PDF  postscript BibTeX
Public Traceability in Traitor Tracing Schemes., Hervé Chabanne, Duong Hieu Phan, David Pointcheval, pp. 542-558
 PDF  postscript BibTeX
One-Way Chain Based Broadcast Encryption Schemes., Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo, pp. 559-574
 PDF  postscript BibTeX

[ IACR home page ] © IACR