CRYPTO 2005:
Santa Barbara, California, USA
Victor Shoup, (Ed.):
Advances in Cryptology -
CRYPTO 2005: 25th Annual International Cryptology Conference,
Santa Barbara, California, USA,
August 14-18, 2005,
Proceedings.
CRYPTO 2005
August 14-18, 2005, Santa Barbara, California, USA
Sponsored by the
International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy
Computer Science Department, University of California, Santa Barbara
General Chair Stuart Haber, HP Labs, USA
Program Chair Victor Shoup, New York University, USA
Program Committee
Masayuki Abe | NTT Information Sharing Platform Laboratories, Japan | |
Boaz Barak | Institute for Advanced Study & Princeton University, USA | |
Amos Beimel | Ben-Gurion University, Israel | |
Alex Biryukov | Katholieke Universiteit Leuven, Belgium | |
John Black | University of Colorado at Boulder, USA | |
Alexandra Boldyreva | Georgia Institute of Technology, USA | |
Jan Camenisch | IBM Zurich Research Laboratory, Switzerland | |
Jean-Sébastien Coron | University of Luxembourg, Luxembourg | |
Craig Gentry | DoCoMo USA Labs, USA | |
Shai Halevi | IBM T. J. Watson Research Center, USA | |
Stanislaw Jarecki | University of California at Irvine, USA | |
Antoine Joux | DGA & Univ. Versailles St-Quentin, France | |
Jonathan Katz | University of Maryland, USA | |
Arjen Lenstra | Lucent Technologies, USA & TU Eindhoven, The Netherlands | |
Yehuda Lindell | Bar-Ilan University, Israel | |
Tal Malkin | Columbia University, USA | |
Ilya Mironov | Microsoft Research, USA | |
David Naccache | Gemplus, France & Royal Holloway, UK | |
Moni Naor | Weizmann Institute of Science, Israel | |
Leonid Reyzin | Boston University, USA | |
Louis Salvail | Aarhus Universitet, Denmark | |
Alice Silverberg | University of California at Irvine, USA | |
Adam Smith | Weizmann Institute of Science, Israel | |
Rebecca Wright | Stevens Institute of Technology, USA |
External Reviewers
Advisory Members
Matt Franklin (Crypto 2004 Program Chair) UC Davis, USA
Cynthia Dwork (Crypto 2006 Program Chair) Microsoft Research, USA
-
Xiaoyun Wang
,
Hongbo Yu
,
Yiqun Lisa Yin
:
Efficient Collision Search Attacks on SHA-0 , ( .ps ). 1-16
BibTeX -
Xiaoyun Wang
,
Yiqun Lisa Yin
,
Hongbo Yu
:
Finding Collisions in the Full SHA-1 , ( .ps ). 17-36
BibTeX -
Cynthia Dwork
,
Moni Naor
,
Hoeteck Wee
:
Pebbling and Proofs of Work , ( .ps ). 37-54
BibTeX -
Krzysztof Pietrzak
:
Composition Does Not Imply Adaptive Security , ( .ps ). 55-65
BibTeX -
Robert Granger
,
Frederik Vercauteren
:
On the Discrete Logarithm Problem on Algebraic Tori , ( .ps ). 66-85
BibTeX -
Alexei G. Myasnikov
,
Vladimir Shpilrain
,
Alexander Ushakov
:
A Practical Attack on a Braid Group Based Cryptographic Protocol , ( .ps ). 86-96
BibTeX -
Yi Lu
,
Willi Meier
,
Serge Vaudenay
:
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption , ( .ps ). 97-117
BibTeX -
Rafael Pass
,
Abhi Shelat
:
Unconditional Characterizations of Non-interactive Zero-Knowledge , ( .ps ). 118-134
BibTeX -
Joël Alwen
,
Giuseppe Persiano
,
Ivan Visconti
:
Impossibility and Feasibility Results for Zero Knowledge with Public Keys , ( .ps ). 135-151
BibTeX -
Marc Fischlin
:
Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors , ( .ps ). 152-168
BibTeX -
Jan Camenisch
,
Anna Lysyanskaya
:
A Formal Treatment of Onion Routing , ( .ps ). 169-187
BibTeX -
Kun Peng
,
Colin Boyd
,
Ed Dawson
:
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy , ( .ps ). 188-204
BibTeX -
Michel Abdalla
,
Mihir Bellare
,
Dario Catalano
,
Eike Kiltz
,
Tadayoshi Kohno
,
Tanja Lange
,
John Malone-Lee
,
Gregory Neven
,
Pascal Paillier
,
Haixia Shi
:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , ( .ps ). 205-222
BibTeX -
Rafail Ostrovsky
,
William E. Skeith III
:
Private Searching on Streaming Data , ( .ps ). 223-240
BibTeX -
Lea Kissner
,
Dawn Xiaodong Song
:
Privacy-Preserving Set Operations , ( .ps ). 241-257
BibTeX -
Dan Boneh
,
Craig Gentry
,
Brent Waters
:
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , ( .ps ). 258-275
BibTeX -
Jung Yeon Hwang
,
Dong Hoon Lee
,
Jongin Lim
:
Generic Transformation for Scalable Broadcast Encryption Schemes , ( .ps ). 276-292
BibTeX -
Ari Juels
,
Stephen A. Weis
:
Authenticating Pervasive Devices with Human Protocols , ( .ps ). 293-308
BibTeX -
Serge Vaudenay
:
Secure Communications over Insecure Channels Based on Short Authenticated Strings , ( .ps ). 309-326
BibTeX -
Ronald Cramer
,
Vanesa Daza
,
Ignacio Gracia
,
Jorge Jiménez Urroz
,
Gregor Leander
,
Jaume Martí-Farré
,
Carles Padró
:
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes , ( .ps ). 327-343
BibTeX -
Ronald Cramer
,
Serge Fehr
,
Martijn Stam
:
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields , ( .ps ). 344-360
BibTeX -
Boaz Barak
,
Ran Canetti
,
Yehuda Lindell
,
Rafael Pass
,
Tal Rabin
:
Secure Computation Without Authentication , ( .ps ). 361-377
BibTeX -
Ivan Damgård
,
Yuval Ishai
:
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator , ( .ps ). 378-394
BibTeX -
Omer Barkol
,
Yuval Ishai
:
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems , ( .ps ). 395-411
BibTeX -
Alexandra Boldyreva
,
Marc Fischlin
:
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes , ( .ps ). 412-429
BibTeX -
Jean-Sébastien Coron
,
Yevgeniy Dodis
,
Cécile Malinaud
,
Prashant Puniya
:
Merkle-Damgård Revisited: How to Construct a Hash Function , ( .ps ). 430-448
BibTeX -
Yevgeniy Dodis
,
Roberto Oliveira
,
Krzysztof Pietrzak
:
On the Generic Insecurity of the Full Domain Hash , ( .ps ). 449-466
BibTeX -
Stefan Wolf
,
Jürg Wullschleger
:
New Monotones and Lower Bounds in Unconditional Two-Party Computation , ( .ps ). 467-477
BibTeX -
Thomas Holenstein
,
Renato Renner
:
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption , ( .ps ). 478-493
BibTeX -
Ivan Damgård
,
Thomas Brochmann Pedersen
,
Louis Salvail
:
A Quantum Cipher with Near Optimal Key-Recycling , ( .ps ). 494-510
BibTeX -
Benoît Chevallier-Mames
:
An Efficient CDH-Based Signature Scheme with a Tight Security Reduction , ( .ps ). 511-526
BibTeX -
Mihir Bellare
,
Krzysztof Pietrzak
,
Phillip Rogaway
:
Improved Security Analyses for CBC MACs , ( .ps ). 527-545
BibTeX -
Hugo Krawczyk
:
HMQV: A High-Performance Secure Diffie-Hellman Protocol , ( .ps ). 546-566
BibTeX