Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu (auth.), Ronald Cramer (eds.)3540259104, 9783540259107
Table of contents :
Front Matter….Pages –
Cryptanalysis of the Hash Functions MD4 and RIPEMD….Pages 1-18
How to Break MD5 and Other Hash Functions….Pages 19-35
Collisions of SHA-0 and Reduced SHA-1….Pages 36-57
Reducing Complexity Assumptions for Statistically-Hiding Commitment….Pages 58-77
Smooth Projective Hashing and Two-Message Oblivious Transfer….Pages 78-95
On Robust Combiners for Oblivious Transfer and Other Primitives….Pages 96-113
Efficient Identity-Based Encryption Without Random Oracles….Pages 114-127
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM….Pages 128-146
Secure Remote Authentication Using Biometric Data….Pages 147-163
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators….Pages 164-180
3-Move Undeniable Signature Scheme….Pages 181-197
Group Signatures with Efficient Concurrent Join….Pages 198-214
Floating-Point LLL Revisited….Pages 215-233
Practical Cryptography in High Dimensional Tori….Pages 234-250
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers….Pages 251-267
Computational Indistinguishability Between Quantum States and Its Cryptographic Application….Pages 268-284
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes….Pages 285-301
Compact E-Cash….Pages 302-321
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience….Pages 322-340
Differential Cryptanalysis for Multivariate Schemes….Pages 341-353
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem….Pages 354-370
Partial Key Exposure Attacks on RSA up to Full Size Exponents….Pages 371-386
The RSA Group is Pseudo-Free….Pages 387-403
Universally Composable Password-Based Key Exchange….Pages 404-421
Mercurial Commitments with Applications to Zero-Knowledge Sets….Pages 422-439
Hierarchical Identity Based Encryption with Constant Size Ciphertext….Pages 440-456
Fuzzy Identity-Based Encryption….Pages 457-473
Second Preimages on n -Bit Hash Functions for Much Less than 2 n Work….Pages 474-490
Predicting and Distinguishing Attacks on RC4 Keystream Generator….Pages 491-506
Related-Key Boomerang and Rectangle Attacks….Pages 507-525
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions….Pages 526-541
Public Traceability in Traitor Tracing Schemes….Pages 542-558
One-Way Chain Based Broadcast Encryption Schemes….Pages 559-574
Back Matter….Pages –
Reviews
There are no reviews yet.