Advances in Cryptology – EUROCRYPT 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2008, held in Istanbul, Turkey, in April 2008.

The 31 revised full papers presented were carefully reviewed and selected from 163 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on cryptanalysis, signatures, encryption, curve based cryptography, hash and mac function constructions, cryptanalysis of hash and mac functions, multi-party computation, protocols, zero knowledge, foundations, and UC multi-party computation using tamper proof hardware.

Author(s): Sebastiaan Indesteege, Nathan Keller (auth.), Nigel Smart (eds.)
Series: Lecture Notes in Computer Science 4965 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 564
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems

Front Matter....Pages -
A Practical Attack on KeeLoq....Pages 1-18
Key Recovery on Hidden Monomial Multivariate Schemes....Pages 19-30
Predicting Lattice Reduction....Pages 31-51
Efficient Sequential Aggregate Signed Data....Pages 52-69
Proving Tight Security for Rabin-Williams Signatures....Pages 70-87
Threshold RSA for Dynamic and Ad-Hoc Groups....Pages 88-107
Towards Key-Dependent Message Security in the Standard Model....Pages 108-126
The Twin Diffie-Hellman Problem and Applications....Pages 127-145
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products....Pages 146-162
Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves....Pages 163-180
On the Indifferentiability of the Sponge Construction....Pages 181-197
A New Mode of Operation for Block Ciphers and Length-Preserving MACs....Pages 198-219
Security/Efficiency Tradeoffs for Permutation-Based Hashing....Pages 220-236
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5....Pages 237-253
Collisions for the LPS Expander Graph Hash Function....Pages 254-269
Second Preimage Attacks on Dithered Hash Functions....Pages 270-288
Efficient Two Party and Multi Party Computation Against Covert Adversaries....Pages 289-306
Almost-Everywhere Secure Computation....Pages 307-323
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme....Pages 324-340
Protocols and Lower Bounds for Failure Localization in the Internet....Pages 341-360
: Increasing the Security and Efficiency of ....Pages 361-378
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle....Pages 379-396
Precise Concurrent Zero Knowledge....Pages 397-414
Efficient Non-interactive Proof Systems for Bilinear Groups....Pages 415-432
Zero-Knowledge Sets with Short Proofs....Pages 433-450
Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves....Pages 451-470
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors....Pages 471-488
Obfuscating Point Functions with Multibit Output....Pages 489-508
Isolated Proofs of Knowledge and Isolated Zero Knowledge....Pages 509-526
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware....Pages 527-544
New Constructions for UC Secure Computation Using Tamper-Proof Hardware....Pages 545-562
Back Matter....Pages -