Normal view MARC view ISBD view

Advances in Cryptology - EUROCRYPT 2008 [electronic resource] : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings / edited by Nigel Smart.

Contributor(s): Smart, Nigel [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 4965Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008Edition: 1st ed. 2008.Description: XIII, 564 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540789673.Subject(s): Cryptography | Data encryption (Computer science) | Computer networks  | Data protection | Algorithms | Computer science -- Mathematics | Discrete mathematics | Electronic data processing -- Management | Cryptology | Computer Communication Networks | Data and Information Security | Algorithms | Discrete Mathematics in Computer Science | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
A Practical Attack on KeeLoq -- Key Recovery on Hidden Monomial Multivariate Schemes -- Predicting Lattice Reduction -- Efficient Sequential Aggregate Signed Data -- Proving Tight Security for Rabin-Williams Signatures -- Threshold RSA for Dynamic and Ad-Hoc Groups -- Towards Key-Dependent Message Security in the Standard Model -- The Twin Diffie-Hellman Problem and Applications -- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products -- Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves -- On the Indifferentiability of the Sponge Construction -- A New Mode of Operation for Block Ciphers and Length-Preserving MACs -- Security/Efficiency Tradeoffs for Permutation-Based Hashing -- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 -- Collisions for the LPS Expander Graph Hash Function -- Second Preimage Attacks on Dithered Hash Functions -- Efficient Two Party and Multi Party Computation Against Covert Adversaries -- Almost-Everywhere Secure Computation -- Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme -- Protocols and Lower Bounds for Failure Localization in the Internet -- : Increasing the Security and Efficiency of -- Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle -- Precise Concurrent Zero Knowledge -- Efficient Non-interactive Proof Systems for Bilinear Groups -- Zero-Knowledge Sets with Short Proofs -- Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves -- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors -- Obfuscating Point Functions with Multibit Output -- Isolated Proofs of Knowledge and Isolated Zero Knowledge -- David and Goliath Commitments: UC Computation for Asymmetric PartiesUsing Tamper-Proof Hardware -- New Constructions for UC Secure Computation Using Tamper-Proof Hardware.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

A Practical Attack on KeeLoq -- Key Recovery on Hidden Monomial Multivariate Schemes -- Predicting Lattice Reduction -- Efficient Sequential Aggregate Signed Data -- Proving Tight Security for Rabin-Williams Signatures -- Threshold RSA for Dynamic and Ad-Hoc Groups -- Towards Key-Dependent Message Security in the Standard Model -- The Twin Diffie-Hellman Problem and Applications -- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products -- Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves -- On the Indifferentiability of the Sponge Construction -- A New Mode of Operation for Block Ciphers and Length-Preserving MACs -- Security/Efficiency Tradeoffs for Permutation-Based Hashing -- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 -- Collisions for the LPS Expander Graph Hash Function -- Second Preimage Attacks on Dithered Hash Functions -- Efficient Two Party and Multi Party Computation Against Covert Adversaries -- Almost-Everywhere Secure Computation -- Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme -- Protocols and Lower Bounds for Failure Localization in the Internet -- : Increasing the Security and Efficiency of -- Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle -- Precise Concurrent Zero Knowledge -- Efficient Non-interactive Proof Systems for Bilinear Groups -- Zero-Knowledge Sets with Short Proofs -- Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves -- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors -- Obfuscating Point Functions with Multibit Output -- Isolated Proofs of Knowledge and Isolated Zero Knowledge -- David and Goliath Commitments: UC Computation for Asymmetric PartiesUsing Tamper-Proof Hardware -- New Constructions for UC Secure Computation Using Tamper-Proof Hardware.

There are no comments for this item.

Log in to your account to post a comment.