Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.)3540768998, 9783540768999
Table of contents :
Front Matter….Pages –
A Kilobit Special Number Field Sieve Factorization….Pages 1-12
When e -th Roots Become Easier Than Factoring….Pages 13-28
Faster Addition and Doubling on Elliptic Curves….Pages 29-50
A Non-interactive Shuffle with Pairing Based Verifiability….Pages 51-67
On Privacy Models for RFID….Pages 68-87
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust….Pages 88-112
A Simple Variant of the Merkle-Damgård Scheme with a Permutation….Pages 113-129
Seven-Property-Preserving Iterated Hashing: ROX….Pages 130-146
How to Build a Hash Function from Any Collision-Resistant Function….Pages 147-163
Fully Anonymous Group Signatures Without Random Oracles….Pages 164-180
Group Encryption….Pages 181-199
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys….Pages 200-215
Boosting Merkle-Damgård Hashing for Message Authentication….Pages 216-231
On Efficient Message Authentication Via Block Cipher Design Techniques….Pages 232-248
Symmetric Key Cryptography on Modern Graphics Hardware….Pages 249-264
Blind Identity-Based Encryption and Simulatable Oblivious Transfer….Pages 265-282
Multi-party Indirect Indexing and Applications….Pages 283-297
Two-Party Computing with Encrypted Data….Pages 298-314
Known-Key Distinguishers for Some Block Ciphers….Pages 315-324
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions….Pages 325-341
On Tweaking Luby-Rackoff Blockciphers….Pages 342-356
Secure Protocols with Asymmetric Trust….Pages 357-375
Simple and Efficient Perfectly-Secure Asynchronous MPC….Pages 376-392
Efficient Byzantine Agreement with Faulty Minority….Pages 393-409
Information-Theoretic Security Without an Honest Majority….Pages 410-426
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations….Pages 427-443
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions….Pages 444-459
Anonymous Quantum Communication….Pages 460-473
Authenticated Key Exchange and Key Encapsulation in the Standard Model….Pages 474-484
Miniature CCA2 PK Encryption: Tight Security Without Redundancy….Pages 485-501
Bounded CCA2-Secure Encryption….Pages 502-518
Relations Among Notions of Non-malleability for Encryption….Pages 519-535
Cryptanalysis of the Tiger Hash Function….Pages 536-550
Cryptanalysis of Grindahl ….Pages 551-567
A Key Recovery Attack on Edon80….Pages 568-581
Back Matter….Pages –
Reviews
There are no reviews yet.