Table of Contents for: Advances in cryptology -- EUROCRYPT 2009

 Staff view

You must be logged in to Tag Records

Advances in cryptology -- EUROCRYPT 2009 [electronic resource] : 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 : proceedings /

Antoine Joux (ed.).

Book Cover
Names: Joux, Antoine
Published: Berlin ; Springer, 2009.
Series: LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 5479.
Topics: Computers - Access control - Congresses. | Cryptography - Congresses. | Data transmission systems - Security measures - Congresses.
Tags: Add

Spaces will separate tags.
Use quotes for multi-word tags.

Possibility and impossibility results for encryption and commitment secure under selective opening -- Breaking RSA generically is equivalent to factoring -- Resettably secure computation -- On the security loss in cryptographic reductions -- On randomizing hash functions to strengthen the security of digital signatures -- Cryptanalysis of MDC-2 -- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC -- Finding preimages in full MD5 faster than exhaustive search -- Asymmetric group key agreement -- Adaptive security in broadcast encryption systems (with short ciphertexts) -- Traitors collaborating in public : Pirates 2.0 -- Key agreement from close secrets over unsecured channels -- Order-preserving symmetric encryption -- A double-piped mode of operation for MACs, PRFs and PROs : Security beyond the birthday barrier -- On the security of cryptosystems with quadratic decryption : The nicest cryptanalysis -- Cube attacks on tweakable black box polynomials -- Smashing SQUASH-0 -- Practical chosen ciphertext secure encryption from factoring -- Realizing hash-and-sign signatures under standard assumptions -- A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks -- Cryptography without (hardly any) secrets ? -- Salvaging Merkle-Damgård for practical applications -- On the security of padding-based encryption schemes - or - why we cannot prove OAEP secure in the standard model -- Simulation without the artificial abort : Simplified proof and improved concrete security for Waters' IBE scheme -- On the portability of generalized Schnorr proofs -- A unified framework for the analysis of side-channel key recovery attacks -- A leakage-resilient mode of operation -- ECM on graphics cards -- Double-base number system for multi-scalar multiplications -- Endomorphisms for faster elliptic curve cryptography on a large class of curves -- Generating genus two hyperelliptic curves over large characteristic finite fields -- Verifiable random functions from identity-based key encapsulation -- Optimal randomness extraction from a Diffie-Hellman element -- A new randomness extraction paradigm for hybrid encryption.

Table of Contents for: Advances in cryptology -- EUROCRYPT 2009