Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings /
Zapisane w:
| Korporacja: | |
|---|---|
| Kolejni autorzy: | |
| Format: | Elektroniczne E-book |
| Język: | English |
| Wydane: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
| Wydanie: | 1st ed. 2007. |
| Seria: | Security and Cryptology ;
4622 |
| Hasła przedmiotowe: | |
| Dostęp online: | https://doi.org/10.1007/978-3-540-74143-5 |
| Etykiety: |
Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!
|
Spis treści:
- Cryptanalysis I
- Practical Cryptanalysis of SFLASH
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Secure Searching
- How Should We Solve Search Problems Privately?
- Public Key Encryption That Allows PIR Queries
- Invited Talk
- Information Security Economics – and Beyond
- Theory I
- Cryptography with Constant Input Locality
- Universally-Composable Two-Party Computation in Two Rounds
- Indistinguishability Amplification
- Lattices
- A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
- Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm
- Random Oracles
- Domain Extension of Public Random Functions: Beyond the Birthday Barrier
- Random Oracles and Auxiliary Input
- Hash Functions
- Security-Amplifying Combiners for Collision-Resistant Hash Functions
- Hash Functions and the (Amplified) Boomerang Attack
- Amplifying Collision Resistance: A Complexity-Theoretic Treatment
- Theory II
- How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
- Simulatable VRFs with Applications to Multi-theorem NIZK
- Cryptography in the Multi-string Model
- Quantum Cryptography
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
- Cryptanalysis II
- Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach
- A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073
- Encryption
- Invertible Universal Hashing and the TET Encryption Mode
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Pirate Evolution: How to Make the Most of Your Traitor Keys
- Protocol Analysis
- A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
- A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
- Chernoff-Type Direct Product Theorems
- Public-Key Encryption
- Rerandomizable RCCA Encryption
- Deterministic and Efficiently Searchable Encryption
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Multi-party Computation
- Scalable and Unconditionally Secure Multiparty Computation
- On Secure Multi-party Computation in Black-Box Groups
- A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra.



