Search dblp for Publications

export results for "toc:db/conf/eurocrypt/eurocrypt2005.bht:"

 download as .bib file

@inproceedings{DBLP:conf/eurocrypt/AbeGKS05,
  author       = {Masayuki Abe and
                  Rosario Gennaro and
                  Kaoru Kurosawa and
                  Victor Shoup},
  editor       = {Ronald Cramer},
  title        = {Tag-KEM/DEM: {A} New Framework for Hybrid Encryption and {A} New Analysis
                  of Kurosawa-Desmedt {KEM}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {128--146},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_8},
  doi          = {10.1007/11426639\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbeGKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Bernstein05,
  author       = {Daniel J. Bernstein},
  editor       = {Ronald Cramer},
  title        = {Stronger Security Bounds for Wegman-Carter-Shoup Authenticators},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {164--180},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_10},
  doi          = {10.1007/11426639\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Bernstein05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamCJCLJ05,
  author       = {Eli Biham and
                  Rafi Chen and
                  Antoine Joux and
                  Patrick Carribault and
                  Christophe Lemuet and
                  William Jalby},
  editor       = {Ronald Cramer},
  title        = {Collisions of {SHA-0} and Reduced {SHA-1}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {36--57},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_3},
  doi          = {10.1007/11426639\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamCJCLJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamDK05,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Ronald Cramer},
  title        = {Related-Key Boomerang and Rectangle Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {507--525},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_30},
  doi          = {10.1007/11426639\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlackCS05,
  author       = {John Black and
                  Martin Cochran and
                  Thomas Shrimpton},
  editor       = {Ronald Cramer},
  title        = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {526--541},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_31},
  doi          = {10.1007/11426639\_31},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlackCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlomerM05,
  author       = {Johannes Bl{\"{o}}mer and
                  Alexander May},
  editor       = {Ronald Cramer},
  title        = {A Tool Kit for Finding Small Roots of Bivariate Polynomials over the
                  Integers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {251--267},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_15},
  doi          = {10.1007/11426639\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlomerM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehBG05,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Eu{-}Jin Goh},
  editor       = {Ronald Cramer},
  title        = {Hierarchical Identity Based Encryption with Constant Size Ciphertext},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {440--456},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_26},
  doi          = {10.1007/11426639\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehBG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyenDKOS05,
  author       = {Xavier Boyen and
                  Yevgeniy Dodis and
                  Jonathan Katz and
                  Rafail Ostrovsky and
                  Adam D. Smith},
  editor       = {Ronald Cramer},
  title        = {Secure Remote Authentication Using Biometric Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_9},
  doi          = {10.1007/11426639\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyenDKOS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischHL05,
  author       = {Jan Camenisch and
                  Susan Hohenberger and
                  Anna Lysyanskaya},
  editor       = {Ronald Cramer},
  title        = {Compact E-Cash},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {302--321},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_18},
  doi          = {10.1007/11426639\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CamenischHL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiHKLM05,
  author       = {Ran Canetti and
                  Shai Halevi and
                  Jonathan Katz and
                  Yehuda Lindell and
                  Philip D. MacKenzie},
  editor       = {Ronald Cramer},
  title        = {Universally Composable Password-Based Key Exchange},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {404--421},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_24},
  doi          = {10.1007/11426639\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiHKLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChabannePP05,
  author       = {Herv{\'{e}} Chabanne and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Ronald Cramer},
  title        = {Public Traceability in Traitor Tracing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {542--558},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_32},
  doi          = {10.1007/11426639\_32},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChabannePP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaseHLMR05,
  author       = {Melissa Chase and
                  Alexander Healy and
                  Anna Lysyanskaya and
                  Tal Malkin and
                  Leonid Reyzin},
  editor       = {Ronald Cramer},
  title        = {Mercurial Commitments with Applications to Zero-Knowledge Sets},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {422--439},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_25},
  doi          = {10.1007/11426639\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChaseHLMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CrepeauGS05,
  author       = {Claude Cr{\'{e}}peau and
                  Daniel Gottesman and
                  Adam D. Smith},
  editor       = {Ronald Cramer},
  title        = {Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {285--301},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_17},
  doi          = {10.1007/11426639\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CrepeauGS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DijkGPRSSW05,
  author       = {Marten van Dijk and
                  Robert Granger and
                  Dan Page and
                  Karl Rubin and
                  Alice Silverberg and
                  Martijn Stam and
                  David P. Woodruff},
  editor       = {Ronald Cramer},
  title        = {Practical Cryptography in High Dimensional Tori},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {234--250},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_14},
  doi          = {10.1007/11426639\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DijkGPRSSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ErnstJMW05,
  author       = {Matthias Ernst and
                  Ellen Jochemsz and
                  Alexander May and
                  Benne de Weger},
  editor       = {Ronald Cramer},
  title        = {Partial Key Exposure Attacks on {RSA} up to Full Size Exponents},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {371--386},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_22},
  doi          = {10.1007/11426639\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ErnstJMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FouqueGS05,
  author       = {Pierre{-}Alain Fouque and
                  Louis Granboulan and
                  Jacques Stern},
  editor       = {Ronald Cramer},
  title        = {Differential Cryptanalysis for Multivariate Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {341--353},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_20},
  doi          = {10.1007/11426639\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FouqueGS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HaitnerHKKMS05,
  author       = {Iftach Haitner and
                  Omer Horvitz and
                  Jonathan Katz and
                  Chiu{-}Yuen Koo and
                  Ruggero Morselli and
                  Ronen Shaltiel},
  editor       = {Ronald Cramer},
  title        = {Reducing Complexity Assumptions for Statistically-Hiding Commitment},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {58--77},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_4},
  doi          = {10.1007/11426639\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HaitnerHKKMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HarnikKNRR05,
  author       = {Danny Harnik and
                  Joe Kilian and
                  Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  editor       = {Ronald Cramer},
  title        = {On Robust Combiners for Oblivious Transfer and Other Primitives},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {96--113},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_6},
  doi          = {10.1007/11426639\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HarnikKNRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HirtNP05,
  author       = {Martin Hirt and
                  Jesper Buus Nielsen and
                  Bartosz Przydatek},
  editor       = {Ronald Cramer},
  title        = {Cryptographic Asynchronous Multi-party Computation with Optimal Resilience
                  (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {322--340},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_19},
  doi          = {10.1007/11426639\_19},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HirtNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JhoHCK0Y05,
  author       = {Nam{-}Su Jho and
                  Jung Yeon Hwang and
                  Jung Hee Cheon and
                  Myung{-}Hwan Kim and
                  Dong Hoon Lee and
                  Eun Sun Yoo},
  editor       = {Ronald Cramer},
  title        = {One-Way Chain Based Broadcast Encryption Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {559--574},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_33},
  doi          = {10.1007/11426639\_33},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JhoHCK0Y05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Kalai05,
  author       = {Yael Tauman Kalai},
  editor       = {Ronald Cramer},
  title        = {Smooth Projective Hashing and Two-Message Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {78--95},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_5},
  doi          = {10.1007/11426639\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Kalai05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KawachiKNY05,
  author       = {Akinori Kawachi and
                  Takeshi Koshiba and
                  Harumichi Nishimura and
                  Tomoyuki Yamakami},
  editor       = {Ronald Cramer},
  title        = {Computational Indistinguishability Between Quantum States and Its
                  Cryptographic Application},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {268--284},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_16},
  doi          = {10.1007/11426639\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KawachiKNY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KelseyS05,
  author       = {John Kelsey and
                  Bruce Schneier},
  editor       = {Ronald Cramer},
  title        = {Second Preimages on n-Bit Hash Functions for Much Less than 2\({}^{\mbox{n}}\)
                  Work},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {474--490},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_28},
  doi          = {10.1007/11426639\_28},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KelseyS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Ronald Cramer},
  title        = {Group Signatures with Efficient Concurrent Join},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {198--214},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_12},
  doi          = {10.1007/11426639\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaH05,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Ronald Cramer},
  title        = {3-Move Undeniable Signature Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_11},
  doi          = {10.1007/11426639\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Mantin05,
  author       = {Itsik Mantin},
  editor       = {Ronald Cramer},
  title        = {Predicting and Distinguishing Attacks on {RC4} Keystream Generator},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {491--506},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_29},
  doi          = {10.1007/11426639\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Mantin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Micciancio05,
  author       = {Daniele Micciancio},
  editor       = {Ronald Cramer},
  title        = {The {RSA} Group is Pseudo-Free},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {387--403},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_23},
  doi          = {10.1007/11426639\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Micciancio05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NguenS05,
  author       = {Phong Q. Nguyen and
                  Damien Stehl{\'{e}}},
  editor       = {Ronald Cramer},
  title        = {Floating-Point {LLL} Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {215--233},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_13},
  doi          = {10.1007/11426639\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NguenS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Perret05,
  author       = {Ludovic Perret},
  editor       = {Ronald Cramer},
  title        = {A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret
                  Problem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {354--370},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_21},
  doi          = {10.1007/11426639\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Perret05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SahaiW05,
  author       = {Amit Sahai and
                  Brent Waters},
  editor       = {Ronald Cramer},
  title        = {Fuzzy Identity-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {457--473},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_27},
  doi          = {10.1007/11426639\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SahaiW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WangLFCY05,
  author       = {Xiaoyun Wang and
                  Xuejia Lai and
                  Dengguo Feng and
                  Hui Chen and
                  Xiuyuan Yu},
  editor       = {Ronald Cramer},
  title        = {Cryptanalysis of the Hash Functions {MD4} and {RIPEMD}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_1},
  doi          = {10.1007/11426639\_1},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WangLFCY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WangY05,
  author       = {Xiaoyun Wang and
                  Hongbo Yu},
  editor       = {Ronald Cramer},
  title        = {How to Break {MD5} and Other Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_2},
  doi          = {10.1007/11426639\_2},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WangY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Waters05,
  author       = {Brent Waters},
  editor       = {Ronald Cramer},
  title        = {Efficient Identity-Based Encryption Without Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_7},
  doi          = {10.1007/11426639\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Waters05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2005,
  editor       = {Ronald Cramer},
  title        = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b136415},
  doi          = {10.1007/B136415},
  isbn         = {3-540-25910-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics