Skip to main content
  • Conference proceedings
  • © 2009

Advances in Cryptology – EUROCRYPT 2009

28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5479)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): EUROCRYPT: Annual International Conference on the Theory and Applications of Cryptographic Techniques

Conference proceedings info: EUROCRYPT 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Security, Proofs and Models (1)

    1. Breaking RSA Generically Is Equivalent to Factoring

      • Divesh Aggarwal, Ueli Maurer
      Pages 36-53
    2. Resettably Secure Computation

      • Vipul Goyal, Amit Sahai
      Pages 54-71
  3. Hash Cryptanalysis

    1. Cryptanalysis of MDC-2

      • Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen
      Pages 106-120
    2. Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC

      • Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan
      Pages 121-133
    3. Finding Preimages in Full MD5 Faster Than Exhaustive Search

      • Yu Sasaki, Kazumaro Aoki
      Pages 134-152
  4. Group and Broadcast Encryption

    1. Asymmetric Group Key Agreement

      • Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Domingo-Ferrer
      Pages 153-170
    2. Traitors Collaborating in Public: Pirates 2.0

      • Olivier Billet, Duong Hieu Phan
      Pages 189-205
  5. Cryptosystems (1)

    1. Key Agreement from Close Secrets over Unsecured Channels

      • Bhavana Kanukurthi, Leonid Reyzin
      Pages 206-223
    2. Order-Preserving Symmetric Encryption

      • Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill
      Pages 224-241
  6. Cryptanalysis

    1. Cube Attacks on Tweakable Black Box Polynomials

      • Itai Dinur, Adi Shamir
      Pages 278-299
    2. Smashing SQUASH-0

      • Khaled Ouafi, Serge Vaudenay
      Pages 300-312
  7. Cryptosystems (2)

    1. Practical Chosen Ciphertext Secure Encryption from Factoring

      • Dennis Hofheinz, Eike Kiltz
      Pages 313-332
    2. Realizing Hash-and-Sign Signatures under Standard Assumptions

      • Susan Hohenberger, Brent Waters
      Pages 333-350

Other Volumes

  1. Advances in Cryptology - EUROCRYPT 2009

About this book

This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009. The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 148 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on security, proofs, and models, hash cryptanalysis, group and broadcast encryption, cryptosystems, cryptanalysis, side channels, curves, and randomness.

Editors and Affiliations

  • DGA and University of Versailles Saint-Quentin-en-Yvelines, Versailles cedex, France

    Antoine Joux

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access