Jung Hee Cheon (auth.), Serge Vaudenay (eds.)3540345469, 9783540345466
Table of contents :
Front Matter….Pages –
Security Analysis of the Strong Diffie-Hellman Problem….Pages 1-11
Cryptography in Theory and Practice: The Case of Encryption in IPsec….Pages 12-29
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects….Pages 30-47
Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt….Pages 48-58
Hiding Secret Points Amidst Chaff….Pages 59-72
Parallel and Concurrent Security of the HB and HB + Protocols….Pages 73-87
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol….Pages 88-108
QUAD: A Practical Stream Cipher with Provable Security….Pages 109-128
How to Strengthen Pseudo-random Generators by Using Compression….Pages 129-146
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks….Pages 147-164
VSH, an Efficient and Provable Collision-Resistant Hash Function….Pages 165-182
Herding Hash Functions and the Nostradamus Attack….Pages 183-200
Optimal Reductions Between Oblivious Transfers Using Interactive Hashing….Pages 201-221
Oblivious Transfer Is Symmetric….Pages 222-232
Symplectic Lattice Reduction and NTRU….Pages 233-253
The Function Field Sieve in the Medium Prime Case….Pages 254-270
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures….Pages 271-288
The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model….Pages 289-307
Private Circuits II: Keeping Secrets in Tamperable Circuits….Pages 308-327
Composition Implies Adaptive Security in Minicrypt….Pages 328-338
Perfect Non-interactive Zero Knowledge for NP….Pages 339-358
Language Modeling and Encryption on Packet Switched Networks….Pages 359-372
A Provable-Security Treatment of the Key-Wrap Problem….Pages 373-390
Luby-Rackoff Ciphers from Weak Round Functions?….Pages 391-408
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs….Pages 409-426
Compact Group Signatures Without Random Oracles….Pages 427-444
Practical Identity-Based Encryption Without Random Oracles….Pages 445-464
Sequential Aggregate Signatures and Multisignatures Without Random Oracles….Pages 465-485
Our Data, Ourselves: Privacy Via Distributed Noise Generation….Pages 486-503
On the (Im-)Possibility of Extending Coin Toss….Pages 504-521
Efficient Binary Conversion for Paillier Encrypted Values….Pages 522-537
Information-Theoretic Conditions for Two-Party Secure Function Evaluation….Pages 538-554
Unclonable Group Identification….Pages 555-572
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys….Pages 573-592
Simplified Threshold RSA with Adaptive and Proactive Security….Pages 593-611
Back Matter….Pages –
Reviews
There are no reviews yet.