


default search action
EUROCRYPT 2005: Aarhus, Denmark
- Ronald Cramer:
Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings. Lecture Notes in Computer Science 3494, Springer 2005, ISBN 3-540-25910-4
Cryptanalysis I
- Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu:
Cryptanalysis of the Hash Functions MD4 and RIPEMD. 1-18 - Xiaoyun Wang, Hongbo Yu:
How to Break MD5 and Other Hash Functions. 19-35 - Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby:
Collisions of SHA-0 and Reduced SHA-1. 36-57
Theory I
- Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel:
Reducing Complexity Assumptions for Statistically-Hiding Commitment. 58-77 - Yael Tauman Kalai:
Smooth Projective Hashing and Two-Message Oblivious Transfer. 78-95 - Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen:
On Robust Combiners for Oblivious Transfer and Other Primitives. 96-113
Encryption I
- Brent Waters:
Efficient Identity-Based Encryption Without Random Oracles. 114-127 - Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup:
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. 128-146
Signatures and Authentication
- Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam D. Smith:
Secure Remote Authentication Using Biometric Data. 147-163 - Daniel J. Bernstein:
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators. 164-180 - Kaoru Kurosawa, Swee-Huay Heng:
3-Move Undeniable Signature Scheme. 181-197 - Aggelos Kiayias, Moti Yung:
Group Signatures with Efficient Concurrent Join. 198-214
Algebra and Number Theory I
- Phong Q. Nguyen, Damien Stehlé:
Floating-Point LLL Revisited. 215-233 - Marten van Dijk
, Robert Granger
, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff:
Practical Cryptography in High Dimensional Tori. 234-250 - Johannes Blömer, Alexander May
:
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. 251-267
Quantum Cryptography
- Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami:
Computational Indistinguishability Between Quantum States and Its Cryptographic Application. 268-284 - Claude Crépeau, Daniel Gottesman
, Adam D. Smith:
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes. 285-301
Secure Protocols
- Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. 302-321 - Martin Hirt, Jesper Buus Nielsen
, Bartosz Przydatek:
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract). 322-340
Algebra and Number Theory II
- Pierre-Alain Fouque, Louis Granboulan, Jacques Stern:
Differential Cryptanalysis for Multivariate Schemes. 341-353 - Ludovic Perret:
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. 354-370 - Matthias Ernst, Ellen Jochemsz, Alexander May
, Benne de Weger:
Partial Key Exposure Attacks on RSA up to Full Size Exponents. 371-386 - Daniele Micciancio
:
The RSA Group is Pseudo-Free. 387-403
Theory II
- Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie:
Universally Composable Password-Based Key Exchange. 404-421 - Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:
Mercurial Commitments with Applications to Zero-Knowledge Sets. 422-439
Encryption II
- Dan Boneh, Xavier Boyen, Eu-Jin Goh:
Hierarchical Identity Based Encryption with Constant Size Ciphertext. 440-456 - Amit Sahai, Brent Waters:
Fuzzy Identity-Based Encryption. 457-473
Cryptanalysis II
- John Kelsey
, Bruce Schneier:
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. 474-490 - Itsik Mantin:
Predicting and Distinguishing Attacks on RC4 Keystream Generator. 491-506 - Eli Biham, Orr Dunkelman, Nathan Keller:
Related-Key Boomerang and Rectangle Attacks. 507-525 - John Black, Martin Cochran, Thomas Shrimpton:
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. 526-541
Broadcast Encryption and Traitor Tracing
- Hervé Chabanne, Duong Hieu Phan
, David Pointcheval
:
Public Traceability in Traitor Tracing Schemes. 542-558 - Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo:
One-Way Chain Based Broadcast Encryption Schemes. 559-574

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.