Advances in cryptology - CRYPTO 2005: 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2005
|
Schriftenreihe: | Lecture Notes in Computer Science
3621 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XI, 568 S. |
ISBN: | 9783540281146 3540281142 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV021252658 | ||
003 | DE-604 | ||
005 | 20080212 | ||
007 | t| | ||
008 | 051205s2005 gw |||| 10||| eng d | ||
015 | |a 05,N36,0013 |2 dnb | ||
016 | 7 | |a 976027151 |2 DE-101 | |
020 | |a 9783540281146 |9 978-3-540-28114-6 | ||
020 | |a 3540281142 |c : EUR 72.76 (freier Pr.), sfr 120.50 (freier Pr.) |9 3-540-28114-2 | ||
024 | 3 | |a 9783540281146 | |
028 | 5 | 2 | |a 11535218 |
035 | |a (OCoLC)254720827 | ||
035 | |a (DE-599)BVBBV021252658 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-91G |a DE-739 |a DE-824 |a DE-706 |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.82 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
111 | 2 | |a CRYPTO |n 25 |d 2005 |c Santa Barbara, Calif. |j Verfasser |0 (DE-588)6507864-0 |4 aut | |
245 | 1 | 0 | |a Advances in cryptology - CRYPTO 2005 |b 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings |c Victor Shoup (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2005 | |
300 | |a XI, 568 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 3621 | |
650 | 4 | |a Computers - Access control - Congresses | |
650 | 4 | |a Cryptography - Congresses | |
650 | 4 | |a Data transmission systems - Security measures - Congresses | |
650 | 4 | |a Kongress | |
650 | 4 | |a Kryptologie | |
650 | 4 | |a Santa Barbara <Calif., 2005> | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Shoup, Victor |e Sonstige |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 3621 |w (DE-604)BV000000607 |9 3621 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=2671261&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m Digitalisierung UBPassau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014574013&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-014574013 |
Datensatz im Suchindex
_version_ | 1820874972129656832 |
---|---|
adam_text |
Table of Contents
Efficient Collision Search Attacks on SHA-0
Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
Finding Collisions in the Full
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
Pebbling and Proofe of Work
Cynthia Dwork,
Composition Does Not Imply Adaptive Security
Krzysztof Pietrzak
On the Discrete Logarithm Problem on Algebraic Tori
Robert Granger, Prederik Vercauteren
A Practical Attack on a Braid Group Based Cryptographic
Protocol
Alexei Myasnikov, Vladimir ShpUrain, Alexander Ushakov
The Conditional Correlation Attack: A Practical Attack on Bluetooth
Encryption
Yi
Unconditional Characterizations of Non-interactive Zero-Knowledge
Rafael Pass, abhi shelat
Impossibility and Feasibility Results for Zero Knowledge with Public
Keys
Joël
Communication-Efficient Non-interactive Proofs of Knowledge with
Online Extractors
Marc Fischlin
A Formal Treatment of Onion Routing
Jan Camenisch, Anna Lysyanskaya
Simple and Efficient Shuffling with Provable Correctness and
ZK Privacy
Kun Peng, Colin Boyd, Ed Dawson
X Table of Contents
Searchable Encryption Revisited: Consistency Properties, Relation to
Anonymous IBE, and Extensions
Michel Abdcdla, Mihir
Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven,
Pascal Paülier, Haixia Shi. 205
Private
Rafaü Ostrovsky, William E. Skeüh
Privacy-Preserving Set Operations
Lea Kissner, Dawn Song
Collusion Resistant Broadcast Encryption with Short Ciphertexts and
Private Keys
Dan Boneh, Craig Gentry, Brent Waters
Generic Transformation for Scalable Broadcast Encryption Schemes
Jung Yeon Hwang, Dong Hoon
Authenticating Pervasive Devices with Human Protocols
Ari
Secure Communications over Insecure Channels Based on Short
Authenticated Strings
Serge Vaudenay
On Codes, Matroids and Secure Multi-party Computation from Linear
Secret Sharing Schemes
Ronald Cramer, Vanesa Daza,
Gregor Leander,
Black-Box Secret Sharing from Primitive Sets in Algebraic Number
Fields
Ronald Cramer, Serge Fehr, Martijn Stam
Secure Computation Without Authentication
Boaz Barak, Ran
Constant-Round Multiparty Computation Using a Black-Box
Pseudorandom Generator
Ivan
Secure Computation of Constant-Depth Circuits with Applications to
Database Search Problems
Omer Barkol, Yuval Ishai
Table of Contents XI
Analysis of Random Oracle Instantiation Scenarios for
Other Practical Schemes
Alexandra Boldyreva, Marc FischMn
Merkle-Damgard Revisited: How to Construct a Hash Function
Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Maiinaud,
Prashant Puniya
On the Generic Insecurity of the Full Domain Hash
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak
New Monotones and Lower Bounds in Unconditional Two-Party
Computation
Stefan Wolf, Mrg Wtdhchleger
One-Way Secret-Key Agreement and Applications to Circuit
Polarization and Immunization of Public-Key Encryption
Thomas
A Quantum Cipher with Near Optimal Key-Recycling
Ivan
An Efficient CDH-Based Signature Scheme with a Tight Security
Reduction
Benoît Chevallier-Marnes
Improved Security Analyses for CBC MACs
Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway
HMQV: A High-Performance Secure Diffie-Hellman Protocol
Hugo Krawczyk
Author Index |
adam_txt |
Table of Contents
Efficient Collision Search Attacks on SHA-0
Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
Finding Collisions in the Full
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
Pebbling and Proofe of Work
Cynthia Dwork,
Composition Does Not Imply Adaptive Security
Krzysztof Pietrzak
On the Discrete Logarithm Problem on Algebraic Tori
Robert Granger, Prederik Vercauteren
A Practical Attack on a Braid Group Based Cryptographic
Protocol
Alexei Myasnikov, Vladimir ShpUrain, Alexander Ushakov
The Conditional Correlation Attack: A Practical Attack on Bluetooth
Encryption
Yi
Unconditional Characterizations of Non-interactive Zero-Knowledge
Rafael Pass, abhi shelat
Impossibility and Feasibility Results for Zero Knowledge with Public
Keys
Joël
Communication-Efficient Non-interactive Proofs of Knowledge with
Online Extractors
Marc Fischlin
A Formal Treatment of Onion Routing
Jan Camenisch, Anna Lysyanskaya
Simple and Efficient Shuffling with Provable Correctness and
ZK Privacy
Kun Peng, Colin Boyd, Ed Dawson
X Table of Contents
Searchable Encryption Revisited: Consistency Properties, Relation to
Anonymous IBE, and Extensions
Michel Abdcdla, Mihir
Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven,
Pascal Paülier, Haixia Shi. 205
Private
Rafaü Ostrovsky, William E. Skeüh
Privacy-Preserving Set Operations
Lea Kissner, Dawn Song
Collusion Resistant Broadcast Encryption with Short Ciphertexts and
Private Keys
Dan Boneh, Craig Gentry, Brent Waters
Generic Transformation for Scalable Broadcast Encryption Schemes
Jung Yeon Hwang, Dong Hoon
Authenticating Pervasive Devices with Human Protocols
Ari
Secure Communications over Insecure Channels Based on Short
Authenticated Strings
Serge Vaudenay
On Codes, Matroids and Secure Multi-party Computation from Linear
Secret Sharing Schemes
Ronald Cramer, Vanesa Daza,
Gregor Leander,
Black-Box Secret Sharing from Primitive Sets in Algebraic Number
Fields
Ronald Cramer, Serge Fehr, Martijn Stam
Secure Computation Without Authentication
Boaz Barak, Ran
Constant-Round Multiparty Computation Using a Black-Box
Pseudorandom Generator
Ivan
Secure Computation of Constant-Depth Circuits with Applications to
Database Search Problems
Omer Barkol, Yuval Ishai
Table of Contents XI
Analysis of Random Oracle Instantiation Scenarios for
Other Practical Schemes
Alexandra Boldyreva, Marc FischMn
Merkle-Damgard Revisited: How to Construct a Hash Function
Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Maiinaud,
Prashant Puniya
On the Generic Insecurity of the Full Domain Hash
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak
New Monotones and Lower Bounds in Unconditional Two-Party
Computation
Stefan Wolf, Mrg Wtdhchleger
One-Way Secret-Key Agreement and Applications to Circuit
Polarization and Immunization of Public-Key Encryption
Thomas
A Quantum Cipher with Near Optimal Key-Recycling
Ivan
An Efficient CDH-Based Signature Scheme with a Tight Security
Reduction
Benoît Chevallier-Marnes
Improved Security Analyses for CBC MACs
Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway
HMQV: A High-Performance Secure Diffie-Hellman Protocol
Hugo Krawczyk
Author Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_corporate | CRYPTO Santa Barbara, Calif |
author_corporate_role | aut |
author_facet | CRYPTO Santa Barbara, Calif |
author_sort | CRYPTO Santa Barbara, Calif |
building | Verbundindex |
bvnumber | BV021252658 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)254720827 (DE-599)BVBBV021252658 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV021252658</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080212</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">051205s2005 gw |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">05,N36,0013</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">976027151</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540281146</subfield><subfield code="9">978-3-540-28114-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540281142</subfield><subfield code="c">: EUR 72.76 (freier Pr.), sfr 120.50 (freier Pr.)</subfield><subfield code="9">3-540-28114-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540281146</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11535218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)254720827</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021252658</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">CRYPTO</subfield><subfield code="n">25</subfield><subfield code="d">2005</subfield><subfield code="c">Santa Barbara, Calif.</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)6507864-0</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cryptology - CRYPTO 2005</subfield><subfield code="b">25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings</subfield><subfield code="c">Victor Shoup (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 568 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">3621</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers - Access control - Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography - Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems - Security measures - Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kongress</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptologie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Santa Barbara <Calif., 2005></subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shoup, Victor</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">3621</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">3621</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=2671261&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UBPassau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014574013&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014574013</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV021252658 |
illustrated | Not Illustrated |
index_date | 2024-07-02T13:39:47Z |
indexdate | 2025-01-10T15:08:13Z |
institution | BVB |
institution_GND | (DE-588)6507864-0 |
isbn | 9783540281146 3540281142 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014574013 |
oclc_num | 254720827 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-739 DE-824 DE-706 DE-83 DE-11 |
owner_facet | DE-91G DE-BY-TUM DE-739 DE-824 DE-706 DE-83 DE-11 |
physical | XI, 568 S. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | CRYPTO 25 2005 Santa Barbara, Calif. Verfasser (DE-588)6507864-0 aut Advances in cryptology - CRYPTO 2005 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings Victor Shoup (ed.) Berlin [u.a.] Springer 2005 XI, 568 S. txt rdacontent n rdamedia nc rdacarrier Lecture Notes in Computer Science 3621 Computers - Access control - Congresses Cryptography - Congresses Data transmission systems - Security measures - Congresses Kongress Kryptologie Santa Barbara <Calif., 2005> (DE-588)1071861417 Konferenzschrift gnd-content Shoup, Victor Sonstige oth Lecture Notes in Computer Science 3621 (DE-604)BV000000607 3621 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=2671261&prov=M&dok_var=1&dok_ext=htm Inhaltstext Digitalisierung UBPassau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014574013&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in cryptology - CRYPTO 2005 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings Lecture Notes in Computer Science Computers - Access control - Congresses Cryptography - Congresses Data transmission systems - Security measures - Congresses Kongress Kryptologie Santa Barbara <Calif., 2005> |
subject_GND | (DE-588)1071861417 |
title | Advances in cryptology - CRYPTO 2005 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings |
title_auth | Advances in cryptology - CRYPTO 2005 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings |
title_exact_search | Advances in cryptology - CRYPTO 2005 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings |
title_exact_search_txtP | Advances in cryptology - CRYPTO 2005 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings |
title_full | Advances in cryptology - CRYPTO 2005 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings Victor Shoup (ed.) |
title_fullStr | Advances in cryptology - CRYPTO 2005 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings Victor Shoup (ed.) |
title_full_unstemmed | Advances in cryptology - CRYPTO 2005 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings Victor Shoup (ed.) |
title_short | Advances in cryptology - CRYPTO 2005 |
title_sort | advances in cryptology crypto 2005 25th annual international cryptology conference santa barbara california usa august 14 18 2005 proceedings |
title_sub | 25th annual International Cryptology Conference, Santa Barbara, California, USA, August 14 - 18, 2005 ; proceedings |
topic | Computers - Access control - Congresses Cryptography - Congresses Data transmission systems - Security measures - Congresses Kongress Kryptologie Santa Barbara <Calif., 2005> |
topic_facet | Computers - Access control - Congresses Cryptography - Congresses Data transmission systems - Security measures - Congresses Kongress Kryptologie Santa Barbara <Calif., 2005> Konferenzschrift |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=2671261&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014574013&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT cryptosantabarbaracalif advancesincryptologycrypto200525thannualinternationalcryptologyconferencesantabarbaracaliforniausaaugust14182005proceedings AT shoupvictor advancesincryptologycrypto200525thannualinternationalcryptologyconferencesantabarbaracaliforniausaaugust14182005proceedings |