Mihir Bellare, Dennis Hofheinz, Scott Yilek (auth.), Antoine Joux (eds.)3642010008, 9783642010002
This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009.
The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 148 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on security, proofs, and models, hash cryptanalysis, group and broadcast encryption, cryptosystems, cryptanalysis, side channels, curves, and randomness.
Table of contents :
Front Matter….Pages –
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening….Pages 1-35
Breaking RSA Generically Is Equivalent to Factoring….Pages 36-53
Resettably Secure Computation….Pages 54-71
On the Security Loss in Cryptographic Reductions….Pages 72-87
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures….Pages 88-105
Cryptanalysis of MDC-2….Pages 106-120
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC….Pages 121-133
Finding Preimages in Full MD5 Faster Than Exhaustive Search….Pages 134-152
Asymmetric Group Key Agreement….Pages 153-170
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)….Pages 171-188
Traitors Collaborating in Public: Pirates 2.0….Pages 189-205
Key Agreement from Close Secrets over Unsecured Channels….Pages 206-223
Order-Preserving Symmetric Encryption….Pages 224-241
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier….Pages 242-259
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis….Pages 260-277
Cube Attacks on Tweakable Black Box Polynomials….Pages 278-299
Smashing SQUASH-0….Pages 300-312
Practical Chosen Ciphertext Secure Encryption from Factoring….Pages 313-332
Realizing Hash-and-Sign Signatures under Standard Assumptions….Pages 333-350
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks….Pages 351-368
Cryptography without (Hardly Any) Secrets ?….Pages 369-370
Salvaging Merkle-Damgård for Practical Applications….Pages 371-388
On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model….Pages 389-406
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme….Pages 407-424
On the Portability of Generalized Schnorr Proofs….Pages 425-442
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks….Pages 443-461
A Leakage-Resilient Mode of Operation….Pages 462-482
ECM on Graphics Cards….Pages 483-501
Double-Base Number System for Multi-scalar Multiplications….Pages 502-517
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves….Pages 518-535
Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields….Pages 536-553
Verifiable Random Functions from Identity-Based Key Encapsulation….Pages 554-571
Optimal Randomness Extraction from a Diffie-Hellman Element….Pages 572-589
A New Randomness Extraction Paradigm for Hybrid Encryption….Pages 590-609
Back Matter….Pages –
Reviews
There are no reviews yet.