Advances in Cryptology – EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4004 : Security and Cryptology

ISBN: 3540345469, 9783540345466

Size: 6 MB (6647933 bytes)

Pages: 622/623

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Jung Hee Cheon (auth.), Serge Vaudenay (eds.)3540345469, 9783540345466

The 2006 edition of the Eurocrypt conference was held in St. Petersburg,Russia from May 28 to June 1, 2006. It was the 25th Eurocrypt conference. Eurocrypt is sponsored by the International Association for Cryptologic Research (IACR). Eurocrypt2006waschairedbyAnatolyLebedev,andIhadtheprivilegetochair the Program Committee. Eurocrypt collected 198 submissions on November 21, 2005. The Program Committee carried out a thorough review process. In total, 863 review reports were written by renowned experts, Program Committee members as well as external referees. Online discussions led to 1,114 additional discussion messages and about 1,000 emails. The review process was run using e-mail and the iChair software by Thomas Baign` eres and Matthieu Finiasz. Every submitted paper received at least three review reports. The Program Committee had a meeting in Lausanne on February 4, 2006. We selected 33 papers, noti?ed acceptance or rejection to the authors, and had a cheese fondue. Authors were then invited to revise their submission. The present proceedings include all the revised papers. Due to time constraints the revised versions could not be reviewed again. We delivered a “Eurocrypt Best Paper Award.” The purpose of the award is to formally acknowledge authors of outstanding papers and to recognize – cellence in the cryptographic research ?elds. Committee members were invited to nominate papers for this award. A poll then yielded a clear majority. This year, we were pleased to deliver the Eurocrypt Best Paper Award to Phong Q.

Table of contents :
Front Matter….Pages –
Security Analysis of the Strong Diffie-Hellman Problem….Pages 1-11
Cryptography in Theory and Practice: The Case of Encryption in IPsec….Pages 12-29
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects….Pages 30-47
Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt….Pages 48-58
Hiding Secret Points Amidst Chaff….Pages 59-72
Parallel and Concurrent Security of the HB and HB  +  Protocols….Pages 73-87
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol….Pages 88-108
QUAD: A Practical Stream Cipher with Provable Security….Pages 109-128
How to Strengthen Pseudo-random Generators by Using Compression….Pages 129-146
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks….Pages 147-164
VSH, an Efficient and Provable Collision-Resistant Hash Function….Pages 165-182
Herding Hash Functions and the Nostradamus Attack….Pages 183-200
Optimal Reductions Between Oblivious Transfers Using Interactive Hashing….Pages 201-221
Oblivious Transfer Is Symmetric….Pages 222-232
Symplectic Lattice Reduction and NTRU….Pages 233-253
The Function Field Sieve in the Medium Prime Case….Pages 254-270
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures….Pages 271-288
The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model….Pages 289-307
Private Circuits II: Keeping Secrets in Tamperable Circuits….Pages 308-327
Composition Implies Adaptive Security in Minicrypt….Pages 328-338
Perfect Non-interactive Zero Knowledge for NP….Pages 339-358
Language Modeling and Encryption on Packet Switched Networks….Pages 359-372
A Provable-Security Treatment of the Key-Wrap Problem….Pages 373-390
Luby-Rackoff Ciphers from Weak Round Functions?….Pages 391-408
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs….Pages 409-426
Compact Group Signatures Without Random Oracles….Pages 427-444
Practical Identity-Based Encryption Without Random Oracles….Pages 445-464
Sequential Aggregate Signatures and Multisignatures Without Random Oracles….Pages 465-485
Our Data, Ourselves: Privacy Via Distributed Noise Generation….Pages 486-503
On the (Im-)Possibility of Extending Coin Toss….Pages 504-521
Efficient Binary Conversion for Paillier Encrypted Values….Pages 522-537
Information-Theoretic Conditions for Two-Party Secure Function Evaluation….Pages 538-554
Unclonable Group Identification….Pages 555-572
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys….Pages 573-592
Simplified Threshold RSA with Adaptive and Proactive Security….Pages 593-611
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Advances in Cryptology – EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings”
Shopping Cart
Scroll to Top