The Resource Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)

Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)

Label
Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings
Title
Advances in Cryptology – EUROCRYPT 2005
Title remainder
24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings
Statement of responsibility
edited by Ronald Cramer
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg? ard was responsible for local organization. TheEurocrypt2005ProgramCommittee(PC)consistedof30internationally renowned experts. Their names and a?liations are listed on pages VII and VIII of these proceedings. By the November 15, 2004 submission deadline the PC had received a total of 190 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, were committed to the IACR Web Review System. These were taken as the starting point for the PC-wideWeb-baseddiscussionphase.Duringthisphase,additionalreportswere provided as needed, and the PC eventually had some 700 reports at its disposal. In addition, the discussions generated more than 850 messages, all posted in the system. During the entire PC phase, which started in August 2003 with my earliest invitations to PC members and which continued until March 2005, more than 1000 email messages were communicated. Moreover, the PC received much appreciated assistance from a large body of external reviewers. Their names are listed on page VIII of these proceedings
Member of
Is Subseries of
Dewey number
003.54
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
2broewmn7h8
Image bit depth
0
Language note
English
LC call number
QA268
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2005
http://bibfra.me/vocab/lite/meetingName
EUROCRYPT
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Cramer, Ronald.
Series statement
Security and Cryptology
Series volume
3494
http://library.link/vocab/subjectName
  • Coding theory
  • Data encryption (Computer science)
  • Computer Communication Networks
  • Operating systems (Computers)
  • Computer software
  • Computational complexity
  • Coding and Information Theory
  • Cryptology
  • Computer Communication Networks
  • Operating Systems
  • Algorithm Analysis and Problem Complexity
  • Discrete Mathematics in Computer Science
Label
Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficient Identity-Based Encryption Without Random Oracles -- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM -- Signatures and Authentication -- Secure Remote Authentication Using Biometric Data -- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators -- 3-Move Undeniable Signature Scheme -- Group Signatures with Efficient Concurrent Join -- Algebra and Number Theory I -- Floating-Point LLL Revisited -- Practical Cryptography in High Dimensional Tori -- A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers -- Quantum Cryptography -- Computational Indistinguishability Between Quantum States and Its Cryptographic Application -- Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes -- Secure Protocols -- Compact E-Cash -- Cryptographic Asynchronous Multi-party Computation with Optimal Resilience -- Algebra and Number Theory II -- Differential Cryptanalysis for Multivariate Schemes -- A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem -- Partial Key Exposure Attacks on RSA up to Full Size Exponents -- The RSA Group is Pseudo-Free -- Theory II -- Universally Composable Password-Based Key Exchange -- Mercurial Commitments with Applications to Zero-Knowledge Sets -- Encryption II -- Hierarchical Identity Based Encryption with Constant Size Ciphertext -- Fuzzy Identity-Based Encryption -- Cryptanalysis II -- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work -- Predicting and Distinguishing Attacks on RC4 Keystream Generator -- Related-Key Boomerang and Rectangle Attacks -- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions -- Broadcast Encryption and Traitor Tracing -- Public Traceability in Traitor Tracing Schemes -- One-Way Chain Based Broadcast Encryption Schemes
Dimensions
unknown
Edition
1st ed. 2005.
Extent
1 online resource (XIV, 578 p.)
File format
multiple file formats
Form of item
online
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/b136415
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000212975
  • (SSID)ssj0000315808
  • (PQKBManifestationID)11232653
  • (PQKBTitleCode)TC0000315808
  • (PQKBWorkID)10263587
  • (PQKB)10938986
  • (DE-He213)978-3-540-32055-5
  • (MiAaPQ)EBC3067803
  • (EXLCZ)991000000000212975
Label
Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficient Identity-Based Encryption Without Random Oracles -- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM -- Signatures and Authentication -- Secure Remote Authentication Using Biometric Data -- Stronger Security Bounds for Wegman-Carter-Shoup Authenticators -- 3-Move Undeniable Signature Scheme -- Group Signatures with Efficient Concurrent Join -- Algebra and Number Theory I -- Floating-Point LLL Revisited -- Practical Cryptography in High Dimensional Tori -- A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers -- Quantum Cryptography -- Computational Indistinguishability Between Quantum States and Its Cryptographic Application -- Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes -- Secure Protocols -- Compact E-Cash -- Cryptographic Asynchronous Multi-party Computation with Optimal Resilience -- Algebra and Number Theory II -- Differential Cryptanalysis for Multivariate Schemes -- A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem -- Partial Key Exposure Attacks on RSA up to Full Size Exponents -- The RSA Group is Pseudo-Free -- Theory II -- Universally Composable Password-Based Key Exchange -- Mercurial Commitments with Applications to Zero-Knowledge Sets -- Encryption II -- Hierarchical Identity Based Encryption with Constant Size Ciphertext -- Fuzzy Identity-Based Encryption -- Cryptanalysis II -- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work -- Predicting and Distinguishing Attacks on RC4 Keystream Generator -- Related-Key Boomerang and Rectangle Attacks -- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions -- Broadcast Encryption and Traitor Tracing -- Public Traceability in Traitor Tracing Schemes -- One-Way Chain Based Broadcast Encryption Schemes
Dimensions
unknown
Edition
1st ed. 2005.
Extent
1 online resource (XIV, 578 p.)
File format
multiple file formats
Form of item
online
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/b136415
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000212975
  • (SSID)ssj0000315808
  • (PQKBManifestationID)11232653
  • (PQKBTitleCode)TC0000315808
  • (PQKBWorkID)10263587
  • (PQKB)10938986
  • (DE-He213)978-3-540-32055-5
  • (MiAaPQ)EBC3067803
  • (EXLCZ)991000000000212975

Library Locations

  • Albert D. Cohen Management LibraryBorrow it
    181 Freedman Crescent, Winnipeg, MB, R3T 5V4, CA
    49.807878 -97.129961
  • Architecture/Fine Arts LibraryBorrow it
    84 Curry Place, Winnipeg, MB, CA
    49.807716 -97.136226
  • Archives and Special CollectionsBorrow it
    25 Chancellors Circle (Elizabeth Dafoe Library), Room 330, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Bibliothèque Alfred-Monnin (Université de Saint-Boniface)Borrow it
    200, avenue de la Cathédrale, Local 2110, Winnipeg, MB, R2H 0H7, CA
    49.888861 -97.119735
  • Bill Larson Library (Grace Hospital)Borrow it
    300 Booth Drive, G-227, Winnipeg, MB, R3J 3M7, CA
    49.882400 -97.276436
  • Carolyn Sifton - Helene Fuld Library (St. Boniface General Hospital)Borrow it
    409 Tache Avenue, Winnipeg, MB, R2H 2A6, CA
    49.883388 -97.126050
  • Concordia Hospital LibraryBorrow it
    1095 Concordia Avenue, Winnipeg, MB, R2K 3S8, CA
    49.913252 -97.064683
  • Donald W. Craik Engineering LibraryBorrow it
    75B Chancellors Circle (Engineering Building E3), Room 361, Winnipeg, MB, R3T 2N2, CA
    49.809053 -97.133292
  • E.K. Williams Law LibraryBorrow it
    224 Dysart Road, Winnipeg, MB, R3T 5V4, CA
    49.811829 -97.131017
  • Eckhardt-Gramatté Music LibraryBorrow it
    136 Dafoe Road (Taché Arts Complex), Room 257, Winnipeg, MB, R3T 2N2, CA
    49.807964 -97.132222
  • Elizabeth Dafoe LibraryBorrow it
    25 Chancellors Circle, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Fr. H. Drake Library (St. Paul's College)Borrow it
    70 Dysart Road, Winnipeg, MB, R3T 2M6, CA
    49.810605 -97.138184
  • J.W. Crane Memorial Library (Deer Lodge Centre)Borrow it
    2109 Portage Avenue, Winnipeg, MB, R3J 0L3, CA
    49.878000 -97.235520
  • Libraries Annex (not open to the public; please see web page for details)Borrow it
    25 Chancellors Circle (in the Elizabeth Dafoe Library), Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Neil John Maclean Health Sciences LibraryBorrow it
    727 McDermot Avenue (Brodie Centre), 200 Level, Winnipeg, MB, R3E 3P5, CA
    49.903563 -97.160554
  • Sciences and Technology LibraryBorrow it
    186 Dysart Road, Winnipeg, MB, R3T 2M8, CA
    49.811526 -97.133257
  • Seven Oaks General Hospital LibraryBorrow it
    2300 McPhillips Street, Winnipeg, MB, R2V 3M3, CA
    49.955177 -97.148865
  • Sister St. Odilon Library (Misericordia Health Centre)Borrow it
    99 Cornish Avenue, Winnipeg, MB, R3C 1A2, CA
    49.879592 -97.160425
  • St. John's College LibraryBorrow it
    92 Dysart Road, Winnipeg, MB, R3T 2M5, CA
    49.811242 -97.137156
  • Victoria General Hospital LibraryBorrow it
    2340 Pembina Highway, Winnipeg, MB, R3T 2E8, CA
    49.806755 -97.152739
  • William R Newman Library (Agriculture)Borrow it
    66 Dafoe Road, Winnipeg, MB, R3T 2R3, CA
    49.806936 -97.135525
Processing Feedback ...