


default search action
25th CRYPTO 2005: Santa Barbara, California, USA
- Victor Shoup:

Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings. Lecture Notes in Computer Science 3621, Springer 2005, ISBN 3-540-28114-2 - Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin:

Efficient Collision Search Attacks on SHA-0. 1-16 - Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu:

Finding Collisions in the Full SHA-1. 17-36 - Cynthia Dwork, Moni Naor, Hoeteck Wee:

Pebbling and Proofs of Work. 37-54 - Krzysztof Pietrzak:

Composition Does Not Imply Adaptive Security. 55-65 - Robert Granger

, Frederik Vercauteren:
On the Discrete Logarithm Problem on Algebraic Tori. 66-85 - Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov:

A Practical Attack on a Braid Group Based Cryptographic Protocol. 86-96 - Yi Lu, Willi Meier, Serge Vaudenay:

The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. 97-117 - Rafael Pass, Abhi Shelat:

Unconditional Characterizations of Non-interactive Zero-Knowledge. 118-134 - Joël Alwen, Giuseppe Persiano, Ivan Visconti:

Impossibility and Feasibility Results for Zero Knowledge with Public Keys. 135-151 - Marc Fischlin:

Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors. 152-168 - Jan Camenisch, Anna Lysyanskaya:

A Formal Treatment of Onion Routing. 169-187 - Kun Peng, Colin Boyd, Ed Dawson:

Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. 188-204 - Michel Abdalla

, Mihir Bellare, Dario Catalano, Eike Kiltz
, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. 205-222 - Rafail Ostrovsky, William E. Skeith III:

Private Searching on Streaming Data. 223-240 - Lea Kissner, Dawn Xiaodong Song:

Privacy-Preserving Set Operations. 241-257 - Dan Boneh, Craig Gentry, Brent Waters:

Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. 258-275 - Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim:

Generic Transformation for Scalable Broadcast Encryption Schemes. 276-292 - Ari Juels, Stephen A. Weis:

Authenticating Pervasive Devices with Human Protocols. 293-308 - Serge Vaudenay:

Secure Communications over Insecure Channels Based on Short Authenticated Strings. 309-326 - Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander

, Jaume Martí-Farré, Carles Padró:
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. 327-343 - Ronald Cramer, Serge Fehr, Martijn Stam:

Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields. 344-360 - Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin:

Secure Computation Without Authentication. 361-377 - Ivan Damgård, Yuval Ishai:

Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. 378-394 - Omer Barkol, Yuval Ishai:

Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems. 395-411 - Alexandra Boldyreva, Marc Fischlin:

Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. 412-429 - Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya:

Merkle-Damgård Revisited: How to Construct a Hash Function. 430-448 - Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak:

On the Generic Insecurity of the Full Domain Hash. 449-466 - Stefan Wolf, Jürg Wullschleger:

New Monotones and Lower Bounds in Unconditional Two-Party Computation. 467-477 - Thomas Holenstein, Renato Renner:

One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. 478-493 - Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail:

A Quantum Cipher with Near Optimal Key-Recycling. 494-510 - Benoît Chevallier-Mames:

An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. 511-526 - Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway:

Improved Security Analyses for CBC MACs. 527-545 - Hugo Krawczyk:

HMQV: A High-Performance Secure Diffie-Hellman Protocol. 546-566

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














