Adi Shamir, Eran Tromer (auth.), Dan Boneh (eds.)3540406743, 9783540406747
Table of contents :
Front Matter….Pages –
Factoring Large Numbers with the TWIRL Device….Pages 1-26
New Partial Key Exposure Attacks on RSA….Pages 27-43
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases….Pages 44-60
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model….Pages 61-77
Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret….Pages 78-95
On Cryptographic Assumptions and Challenges….Pages 96-109
Scalable Protocols for Authenticated Group Key Exchange….Pages 110-125
Practical Verifiable Encryption and Decryption of Discrete Logarithms….Pages 126-144
Extending Oblivious Transfers Efficiently….Pages 145-161
Algebraic Attacks on Combiners with Memory….Pages 162-175
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback….Pages 176-194
Cryptanalysis of Safer++ ….Pages 195-211
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem….Pages 212-225
The Impact of Decryption Failures on the Security of NTRU Encryption….Pages 226-246
Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption….Pages 247-264
Universal Composition with Joint State….Pages 265-281
Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More….Pages 282-298
Derandomization in Cryptography….Pages 299-315
On Deniability in the Common Reference String and Random Oracle Model….Pages 316-337
Primality Proving via One Round in ECPP and One Iteration in AKS….Pages 338-348
Torus-Based Cryptography….Pages 349-365
Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation….Pages 366-382
Multipurpose Identity-Based Signcryption….Pages 383-399
SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols….Pages 400-425
On Memory-Bound Functions for Fighting Spam….Pages 426-444
Lower and Upper Bounds on Obtaining History Independence….Pages 445-462
Private Circuits: Securing Hardware against Probing Attacks….Pages 463-481
A Tweakable Enciphering Mode….Pages 482-499
A Message Authentication Code Based on Unimodular Matrix Groups….Pages 500-512
Luby-Rackoff: 7 Rounds Are Enough for 2 n(1 − ε) Security….Pages 513-529
Weak Key Authenticity and the Computational Completeness of Formal Encryption….Pages 530-547
Plaintext Awareness via Key Registration….Pages 548-564
Relaxing Chosen-Ciphertext Security….Pages 565-582
Password Interception in a SSL/TLS Channel….Pages 583-599
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication….Pages 600-616
Making a Faster Cryptanalytic Time-Memory Trade-Off….Pages 617-630
Back Matter….Pages –
Reviews
There are no reviews yet.