Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings

Front Cover
Springer Science & Business Media, May 9, 2005 - Business & Economics - 576 pages
These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg? ard was responsible for local organization. TheEurocrypt2005ProgramCommittee(PC)consistedof30internationally renowned experts. Their names and a?liations are listed on pages VII and VIII of these proceedings. By the November 15, 2004 submission deadline the PC had received a total of 190 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, were committed to the IACR Web Review System. These were taken as the starting point for the PC-wideWeb-baseddiscussionphase.Duringthisphase,additionalreportswere provided as needed, and the PC eventually had some 700 reports at its disposal. In addition, the discussions generated more than 850 messages, all posted in the system. During the entire PC phase, which started in August 2003 with my earliest invitations to PC members and which continued until March 2005, more than 1000 email messages were communicated. Moreover, the PC received much appreciated assistance from a large body of external reviewers. Their names are listed on page VIII of these proceedings.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Cryptanalysis of the Hash Functions MD4 and RIPEMD
1
How to Break MD5 and Other Hash Functions
19
Collisions of SHA0 and Reduced SHA1
36
Reducing Complexity Assumptions for StatisticallyHiding Commitment
58
Smooth Projective Hashing and TwoMessage Oblivious Transfer
78
On Robust Combiners for Oblivious Transfer and Other Primitives
96
Efficient IdentityBased Encryption Without Random Oracles
114
A New Framework for Hybrid Encryption and New Analysis of KurosawaDesmedt KEM
128
Cryptographic Asynchronous Multiparty Computation with Optimal Resilience Extended Abstract
322
Differential Cryptanalysis for Multivariate Schemes
341
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
354
Partial Key Exposure Attacks on RSA Up to Full Size Exponents
371
The RSA Group is PseudoFree
387
Universally Composable PasswordBased Key Exchange
404
Extended Abstract
422
Hierarchical Identity Based Encryption with Constant Size Ciphertext
440

Secure Remote Authentication Using Biometric Data
147
Stronger Security Bounds for WegmanCarterShoup Authenticators
164
3Move Undeniable Signature Scheme
181
Group Signatures with Efficient Concurrent Join
198
FloatingPoint LLL Revisited
215
Practical Cryptography in High Dimensional Tori
234
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
251
Computational Indistinguishability Between Quantum States and Its Cryptographic Application
268
Approximate Quantum ErrorCorrecting Codes and Secret Sharing Schemes
285
Compact ECash
302
Fuzzy IdentityBased Encryption
457
Second Preimages on nBit Hash Functions for Much Less than 2n Work
474
Predicting and Distinguishing Attacks on RC4 Keystream Generator
491
RelatedKey Boomerang and Rectangle Attacks
507
On the Impossibility of HighlyEfficient BlockcipherBased Hash Functions
526
Public Traceability in Traitor Tracing Schemes
542
OneWay Chain Based Broadcast Encryption Schemes
559
Author Index
575
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information