Advances in Cryptology - CRYPTO 2008: 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings

Front Cover
David Wagner
Springer Science & Business Media, Jul 30, 2008 - Business & Economics - 594 pages

This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008.

The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

The Random Oracle Model and the Ideal Cipher Model Are Equivalent
1
Programmable Hash Functions and Their Applications
21
OneTime Programs
39
Adaptive OneWay Functions and Applications
57
Bits Security of the Elliptic Curve DiffieHellman Secret Keys
75
Improved Bounds on Security Reductions for Discrete Log Based Signatures
93
CircularSecure Encryption from Decision DiffieHellman
108
PublicKey LocallyDecodable Codes
126
Dynamic Threshold PublicKey Encryption
317
On Notions of Security for Deterministic Encryption and Efficient Constructions without Random Oracles
335
Definitional Equivalences and Constructions without Random Oracles
360
Communication Complexity in Algebraic TwoParty Protocols
379
Better SecurityEfficiency Tradeoffs for Compression Functions
397
Compression from Collisions or Why CRHF Combiners Have a Long Output
413
Constructing Cryptographic Hash Functions from FixedKey Blockciphers
433
Simultaneously Solving How and What
451

KeyRecovery Attacks on Universal Hash Function Based MAC Algorithms
144
Cryptanalysis of the GOST Hash Function
162
Preimages for Reduced SHA0 and SHA1
179
A Complete Break of the KEELOQ Code Hopping Scheme
203
Bug Attacks
221
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
241
Classifications and Separations
262
Cryptanalysis of MinRank
280
New State Recovery Attack on RC4
297
New Efficient Attacks on Statistical Disclosure Control Mechanisms
469
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
481
CollusionFree Protocols in the Mediated Model
497
Efficient Constructions of Composable Commitments and ZeroKnowledge Proofs
515
Noninteractive Statistical ZeroKnowledge Proofs for Lattice Problems
536
A Framework for Efficient and Composable Oblivious Transfer
554
Founding Cryptography on Oblivious Transfer Efficiently
572
Author Index
592
Copyright

Other editions - View all

Common terms and phrases