Frederik Vercauteren, Bart Preneel, Joos Vandewalle (auth.), Birgit Pfitzmann (eds.)3540420703, 9783540420705
Table of contents :
A Memory Efficient Version of Satoh’s Algorithm….Pages 1-13
Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy….Pages 14-29
How Secure Are Elliptic Curves over Composite Extension Fields?….Pages 30-39
Efficient and Non-interactive Non-malleable Commitment….Pages 40-59
How to Convert the Flavor of a Quantum Bit Commitment….Pages 60-77
Cryptographic Counters and Applications to Electronic Voting….Pages 78-92
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation….Pages 93-118
Priced Oblivious Transfer: How to Sell Digital Goods….Pages 119-135
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures….Pages 136-151
Practical Threshold RSA Signatures without a Trusted Dealer….Pages 152-165
Hash Functions: From Merkle-Damgård to Shoup….Pages 166-181
Key Recovery and Message Attacks on NTRU-Composite….Pages 182-194
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems….Pages 195-210
NSS: An NTRU Lattice-Based Signature Scheme….Pages 211-228
The Bit Security of Paillier’s Encryption Scheme and Its Applications….Pages 229-243
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference….Pages 244-261
On Adaptive vs. Non-adaptive Security of Multiparty Protocols….Pages 262-279
Multiparty Computation from Threshold Homomorphic Encryption….Pages 280-300
On Perfect and Adaptive Security in Exposure-Resilient Cryptography….Pages 301-324
Cryptanalysis of Reduced-Round MISTY….Pages 325-339
The Rectangle Attack — Rectangling the Serpent….Pages 340-357
Efficient Amplification of the Security of Weak Pseudo-random Function Generators….Pages 358-372
Min-round Resettable Zero-Knowledge in the Public-Key Model….Pages 373-393
Structural Cryptanalysis of SASAS….Pages 395-405
Hyper-bent Functions….Pages 406-419
New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs….Pages 420-436
Lower Bounds for Multicast Message Authentication….Pages 437-452
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels….Pages 453-474
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords….Pages 475-494
Identification Protocols Secure against Reset Attacks….Pages 495-511
Does Encryption with Redundancy Provide Authenticity?….Pages 512-528
Encryption Modes with Almost Free Message Integrity….Pages 529-544
Reviews
There are no reviews yet.