Advances in cryptology - CRYPTO 2006 : 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006 : proceedings /
Advances in cryptology - CRYPTO 2006 : 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006 : proceedings /
CRYPTO 2006 Twenty-sixth Annual International Cryptology Conference International Cryptology Conference
Cynthia Dwork (ed.).
- Berlin ; New York : Springer, ©2006.
- 1 online resource (xiii, 619 pages) : illustrations
- Lecture notes in computer science ; 4117 .
- Lecture notes in computer science ; 4117. .
Includes bibliographical references and index.
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs -- On the Power of the Randomized Iterate -- Strengthening Digital Signatures Via Randomized Hashing -- Round-Optimal Composable Blind Signatures in the Common Reference String Model -- On Signatures of Knowledge -- Non-interactive Zaps and New Techniques for NIZK -- Rankin's Constant and Blockwise Lattice Reduction -- Lattice-Based Cryptography -- A Method for Making Password-Based Key Exchange Resilient to Server Compromise -- Mitigating Dictionary Attacks on Password-Protected Local Storage -- Rationality and Adversarial Behavior in Multi-party Computation -- When Random Sampling Preserves Privacy -- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models -- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets -- On Forward-Secure Storage -- Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One -- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) -- Fast Algorithms for the Free Riders Problem in Broadcast Encryption -- The Number Field Sieve in the Medium Prime Case -- Inverting HFE Is Quasipolynomial -- Cryptanalysis of 2R? Schemes -- Receipt-Free Universally-Verifiable Voting with Everlasting Privacy -- Cryptographic Protocols for Electronic Voting -- Asymptotically Optimal Two-Round Perfectly Secure Message Transmission -- Random Selection with an Adversarial Majority -- Oblivious Transfer and Linear Functions -- On Expected Constant-Round Protocols for Byzantine Agreement -- Robust Multiparty Computation with Linear Communication Complexity -- On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation -- Scalable Secure Multiparty Computation -- Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields -- Automated Security Proofs with Sequences of Games -- On Robust Combiners for Private Information Retrieval and Other Primitives -- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions -- On the Higher Order Nonlinearities of Algebraic Immune Functions -- New Proofs for NMAC and HMAC: Security Without Collision-Resistance.
English.
9783540374336 3540374337 3540374329 9783540374329
10.1007/11818175 doi 9786611388140 (WaSeSS)ssj0000315804
11818175
978-3-540-37432-9 Springer http://www.springerlink.com
06,N33,0014 dnb
980625076 DE-101
Computers--Access control--Congresses.
Cryptography--Congresses.
Cryptographie--Congrès.
Ordinateurs--Accès--Contrôle--Congrès.
Informatique.
Computers--Access control
Cryptography
computers samenleving society wiskunde mathematics informatiesystemen information systems computerwetenschappen computer sciences computernetwerken computer networks gegevensbeheer data management operating systems Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen)
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25 / C79 2006
005.8
Includes bibliographical references and index.
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs -- On the Power of the Randomized Iterate -- Strengthening Digital Signatures Via Randomized Hashing -- Round-Optimal Composable Blind Signatures in the Common Reference String Model -- On Signatures of Knowledge -- Non-interactive Zaps and New Techniques for NIZK -- Rankin's Constant and Blockwise Lattice Reduction -- Lattice-Based Cryptography -- A Method for Making Password-Based Key Exchange Resilient to Server Compromise -- Mitigating Dictionary Attacks on Password-Protected Local Storage -- Rationality and Adversarial Behavior in Multi-party Computation -- When Random Sampling Preserves Privacy -- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models -- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets -- On Forward-Secure Storage -- Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One -- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) -- Fast Algorithms for the Free Riders Problem in Broadcast Encryption -- The Number Field Sieve in the Medium Prime Case -- Inverting HFE Is Quasipolynomial -- Cryptanalysis of 2R? Schemes -- Receipt-Free Universally-Verifiable Voting with Everlasting Privacy -- Cryptographic Protocols for Electronic Voting -- Asymptotically Optimal Two-Round Perfectly Secure Message Transmission -- Random Selection with an Adversarial Majority -- Oblivious Transfer and Linear Functions -- On Expected Constant-Round Protocols for Byzantine Agreement -- Robust Multiparty Computation with Linear Communication Complexity -- On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation -- Scalable Secure Multiparty Computation -- Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields -- Automated Security Proofs with Sequences of Games -- On Robust Combiners for Private Information Retrieval and Other Primitives -- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions -- On the Higher Order Nonlinearities of Algebraic Immune Functions -- New Proofs for NMAC and HMAC: Security Without Collision-Resistance.
English.
9783540374336 3540374337 3540374329 9783540374329
10.1007/11818175 doi 9786611388140 (WaSeSS)ssj0000315804
11818175
978-3-540-37432-9 Springer http://www.springerlink.com
06,N33,0014 dnb
980625076 DE-101
Computers--Access control--Congresses.
Cryptography--Congresses.
Cryptographie--Congrès.
Ordinateurs--Accès--Contrôle--Congrès.
Informatique.
Computers--Access control
Cryptography
computers samenleving society wiskunde mathematics informatiesystemen information systems computerwetenschappen computer sciences computernetwerken computer networks gegevensbeheer data management operating systems Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen)
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25 / C79 2006
005.8