Sebastiaan Indesteege, Nathan Keller (auth.), Nigel Smart (eds.)3540789669, 9783540789666
The 31 revised full papers presented were carefully reviewed and selected from 163 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on cryptanalysis, signatures, encryption, curve based cryptography, hash and mac function constructions, cryptanalysis of hash and mac functions, multi-party computation, protocols, zero knowledge, foundations, and UC multi-party computation using tamper proof hardware.
Table of contents :
Front Matter….Pages –
A Practical Attack on KeeLoq….Pages 1-18
Key Recovery on Hidden Monomial Multivariate Schemes….Pages 19-30
Predicting Lattice Reduction….Pages 31-51
Efficient Sequential Aggregate Signed Data….Pages 52-69
Proving Tight Security for Rabin-Williams Signatures….Pages 70-87
Threshold RSA for Dynamic and Ad-Hoc Groups….Pages 88-107
Towards Key-Dependent Message Security in the Standard Model….Pages 108-126
The Twin Diffie-Hellman Problem and Applications….Pages 127-145
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products….Pages 146-162
Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves….Pages 163-180
On the Indifferentiability of the Sponge Construction….Pages 181-197
A New Mode of Operation for Block Ciphers and Length-Preserving MACs….Pages 198-219
Security/Efficiency Tradeoffs for Permutation-Based Hashing….Pages 220-236
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5….Pages 237-253
Collisions for the LPS Expander Graph Hash Function….Pages 254-269
Second Preimage Attacks on Dithered Hash Functions….Pages 270-288
Efficient Two Party and Multi Party Computation Against Covert Adversaries….Pages 289-306
Almost-Everywhere Secure Computation….Pages 307-323
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme….Pages 324-340
Protocols and Lower Bounds for Failure Localization in the Internet….Pages 341-360
: Increasing the Security and Efficiency of ….Pages 361-378
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle….Pages 379-396
Precise Concurrent Zero Knowledge….Pages 397-414
Efficient Non-interactive Proof Systems for Bilinear Groups….Pages 415-432
Zero-Knowledge Sets with Short Proofs….Pages 433-450
Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves….Pages 451-470
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors….Pages 471-488
Obfuscating Point Functions with Multibit Output….Pages 489-508
Isolated Proofs of Knowledge and Isolated Zero Knowledge….Pages 509-526
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware….Pages 527-544
New Constructions for UC Secure Computation Using Tamper-Proof Hardware….Pages 545-562
Back Matter….Pages –
Reviews
There are no reviews yet.