Skip to main content
  • Conference proceedings
  • © 2007

Advances in Cryptology - CRYPTO 2007

27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4622)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2007.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (34 papers)

  1. Front Matter

  2. Cryptanalysis I

    1. Practical Cryptanalysis of SFLASH

      • Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
      Pages 1-12
    2. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5

      • Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen
      Pages 13-30
  3. Secure Searching

    1. How Should We Solve Search Problems Privately?

      • Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb
      Pages 31-49
    2. Public Key Encryption That Allows PIR Queries

      • Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
      Pages 50-67
  4. Invited Talk

    1. Information Security Economics – and Beyond

      • Ross Anderson, Tyler Moore
      Pages 68-91
  5. Theory I

    1. Cryptography with Constant Input Locality

      • Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
      Pages 92-110
    2. Universally-Composable Two-Party Computation in Two Rounds

      • Omer Horvitz, Jonathan Katz
      Pages 111-129
    3. Indistinguishability Amplification

      • Ueli Maurer, Krzysztof Pietrzak, Renato Renner
      Pages 130-149
  6. Lattices

    1. Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm

      • Guillaume Hanrot, Damien Stehlé
      Pages 170-186
  7. Random Oracles

    1. Random Oracles and Auxiliary Input

      • Dominique Unruh
      Pages 205-223
  8. Hash Functions

    1. Hash Functions and the (Amplified) Boomerang Attack

      • Antoine Joux, Thomas Peyrin
      Pages 244-263
    2. Amplifying Collision Resistance: A Complexity-Theoretic Treatment

      • Ran Canetti, Ron Rivest, Madhu Sudan, Luca Trevisan, Salil Vadhan, Hoeteck Wee
      Pages 264-283
  9. Theory II

    1. How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?

      • Danny Harnik, Yuval Ishai, Eyal Kushilevitz
      Pages 284-302
    2. Simulatable VRFs with Applications to Multi-theorem NIZK

      • Melissa Chase, Anna Lysyanskaya
      Pages 303-322
    3. Cryptography in the Multi-string Model

      • Jens Groth, Rafail Ostrovsky
      Pages 323-341
  10. Quantum Cryptography

    1. Secure Identification and QKD in the Bounded-Quantum-Storage Model

      • Ivan B. DamgÃ¥rd, Serge Fehr, Louis Salvail, Christian Schaffner
      Pages 342-359

Other Volumes

  1. Advances in Cryptology - CRYPTO 2007

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access