zbMATH — the first resource for mathematics

Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. (English) Zbl 1133.94008
Lecture Notes in Computer Science 4965. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). xiii, 564 p. (2008).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The 26th conference has been reviewed (see Zbl 1120.94002).
Indexed articles:
Indesteege, Sebastiaan; Keller, Nathan; Dunkelman, Orr; Biham, Eli; Preneel, Bart, A practical attack on KeeLoq, 1-18 [Zbl 1149.94322]
Fouque, Pierre-Alain; Macario-Rat, Gilles; Stern, Jacques, Key recovery on hidden monomial multivariate schemes, 19-30 [Zbl 1149.94313]
Gama, Nicolas; Nguyen, Phong Q., Predicting lattice reduction, 31-51 [Zbl 1149.94314]
Neven, Gregory, Efficient sequential aggregate signed data, 52-69 [Zbl 1149.94326]
Bernstein, Daniel J., Proving tight security for Rabin-Williams signatures, 70-87 [Zbl 1149.94303]
Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal, Threshold RSA for dynamic and ad-hoc groups, 88-107 [Zbl 1149.94316]
Hofheinz, Dennis; Unruh, Dominique, Towards key-dependent message security in the standard model, 108-126 [Zbl 1149.94321]
Cash, David; Kiltz, Eike; Shoup, Victor, The twin Diffie-Hellman problem and applications, 127-145 [Zbl 1149.94307]
Katz, Jonathan; Sahai, Amit; Waters, Brent, Predicate encryption supporting disjunctions, polynomial equations, and inner products, 146-162 [Zbl 1149.94323]
Smith, Benjamin, Isogenies and the discrete logarithm problem in Jacobians of genus 3 hyperelliptic curves, 163-180 [Zbl 1149.94329]
Bertoni, Guido; Daemen, Joan; Peeters, Michaël; Van Assche, Gilles, On the indifferentiability of the sponge construction, 181-197 [Zbl 1149.94304]
Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant, A new mode of operation for block ciphers and length-preserving MACs, 198-219 [Zbl 1149.94311]
Rogaway, Phillip; Steinberger, John, Security/efficiency tradeoffs for permutation-based hashing, 220-236 [Zbl 1149.94328]
Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru, New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5, 237-253 [Zbl 1149.94331]
Tillich, Jean-Pierre; Zémor, Gilles, Collisions for the LPS expander graph hash function, 254-269 [Zbl 1149.94330]
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien, Second preimage attacks on dithered hash functions, 270-288 [Zbl 1149.94302]
Goyal, Vipul; Mohassel, Payman; Smith, Adam, Efficient two party and multi party computation against covert adversaries, 289-306 [Zbl 1149.94317]
Garay, Juan A.; Ostrovsky, Rafail, Almost-everywhere secure computation, 307-323 [Zbl 1149.68377]
Kurosawa, Kaoru; Suzuki, Kazuhiro, Truly efficient 2-round perfectly secure message transmission scheme, 324-340 [Zbl 1149.94324]
Barak, Boaz; Goldberg, Sharon; Xiao, David, Protocols and lower bounds for failure localization in the internet, 341-360 [Zbl 1149.68312]
Gilbert, Henri; Robshaw, Matthew J. B.; Seurin, Yannick, HB\(^{\#}\): Increasing the security and efficiency of HB\(^{+}\), 361-378 [Zbl 1149.94334]
Groth, Jens; Ishai, Yuval, Sub-linear zero-knowledge argument for correctness of a shuffle, 379-396 [Zbl 1149.94319]
Pandey, Omkant; Pass, Rafael; Sahai, Amit; Tseng, Wei-Lung Dustin; Venkitasubramaniam, Muthuramakrishnan, Precise concurrent zero knowledge, 397-414 [Zbl 1149.94327]
Groth, Jens; Sahai, Amit, Efficient non-interactive proof systems for bilinear groups, 415-432 [Zbl 1149.94320]
Catalano, Dario; Fiore, Dario; Messina, Mariagrazia, Zero-knowledge sets with short proofs, 433-450 [Zbl 1149.94308]
Chen, Hao; Cramer, Ronald; de Haan, Robbert; Pueyo, Ignacio Cascudo, Strongly multiplicative ramp schemes from high degree rational points on curves, 451-470 [Zbl 1149.94309]
Cramer, Ronald; Dodis, Yevgeniy; Fehr, Serge; Padró, Carles; Wichs, Daniel, Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors, 471-488 [Zbl 1149.94333]
Canetti, Ran; Dakdouk, Ronny Ramzi, Obfuscating point functions with multibit output, 489-508 [Zbl 1149.94306]
Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel, Isolated proofs of knowledge and isolated zero knowledge, 509-526 [Zbl 1149.94310]
Moran, Tal; Segev, Gil, David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware, 527-544 [Zbl 1149.94325]
Chandran, Nishanth; Goyal, Vipul; Sahai, Amit, New constructions for UC secure computation using tamper-proof hardware, 545-562 [Zbl 1149.68376]

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI