Skip to main content
  • Conference proceedings
  • © 2008

Advances in Cryptology – EUROCRYPT 2008

27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4965)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): EUROCRYPT: Annual International Conference on the Theory and Applications of Cryptographic Techniques

Conference proceedings info: EUROCRYPT 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

  2. A Practical Attack on KeeLoq

    • Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel
    Pages 1-18
  3. Key Recovery on Hidden Monomial Multivariate Schemes

    • Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern
    Pages 19-30
  4. Predicting Lattice Reduction

    • Nicolas Gama, Phong Q. Nguyen
    Pages 31-51
  5. Efficient Sequential Aggregate Signed Data

    • Gregory Neven
    Pages 52-69
  6. Threshold RSA for Dynamic and Ad-Hoc Groups

    • Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
    Pages 88-107
  7. Towards Key-Dependent Message Security in the Standard Model

    • Dennis Hofheinz, Dominique Unruh
    Pages 108-126
  8. The Twin Diffie-Hellman Problem and Applications

    • David Cash, Eike Kiltz, Victor Shoup
    Pages 127-145
  9. On the Indifferentiability of the Sponge Construction

    • Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
    Pages 181-197
  10. A New Mode of Operation for Block Ciphers and Length-Preserving MACs

    • Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya
    Pages 198-219
  11. Security/Efficiency Tradeoffs for Permutation-Based Hashing

    • Phillip Rogaway, John Steinberger
    Pages 220-236
  12. New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5

    • Lei Wang, Kazuo Ohta, Noboru Kunihiro
    Pages 237-253
  13. Collisions for the LPS Expander Graph Hash Function

    • Jean-Pierre Tillich, Gilles Zémor
    Pages 254-269
  14. Second Preimage Attacks on Dithered Hash Functions

    • Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir et al.
    Pages 270-288
  15. Efficient Two Party and Multi Party Computation Against Covert Adversaries

    • Vipul Goyal, Payman Mohassel, Adam Smith
    Pages 289-306
  16. Almost-Everywhere Secure Computation

    • Juan A. Garay, Rafail Ostrovsky
    Pages 307-323
  17. Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme

    • Kaoru Kurosawa, Kazuhiro Suzuki
    Pages 324-340

Other Volumes

  1. Advances in Cryptology – EUROCRYPT 2008

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access