Skip to main content
  • Conference proceedings
  • © 2005

Advances in Cryptology - CRYPTO 2005

25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3621)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Efficient Collision Search Attacks on SHA-0

    • Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
    Pages 1-16
  3. Finding Collisions in the Full SHA-1

    • Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
    Pages 17-36
  4. Pebbling and Proofs of Work

    • Cynthia Dwork, Moni Naor, Hoeteck Wee
    Pages 37-54
  5. Composition Does Not Imply Adaptive Security

    • Krzysztof Pietrzak
    Pages 55-65
  6. On the Discrete Logarithm Problem on Algebraic Tori

    • R. Granger, F. Vercauteren
    Pages 66-85
  7. A Practical Attack on a Braid Group Based Cryptographic Protocol

    • Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov
    Pages 86-96
  8. Impossibility and Feasibility Results for Zero Knowledge with Public Keys

    • Joël Alwen, Giuseppe Persiano, Ivan Visconti
    Pages 135-151
  9. A Formal Treatment of Onion Routing

    • Jan Camenisch, Anna Lysyanskaya
    Pages 169-187
  10. Simple and Efficient Shuffling with Provable Correctness and ZK Privacy

    • Kun Peng, Colin Boyd, Ed Dawson
    Pages 188-204
  11. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

    • Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange et al.
    Pages 205-222
  12. Private Searching on Streaming Data

    • Rafail Ostrovsky, William E. Skeith III
    Pages 223-240
  13. Privacy-Preserving Set Operations

    • Lea Kissner, Dawn Song
    Pages 241-257
  14. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys

    • Dan Boneh, Craig Gentry, Brent Waters
    Pages 258-275
  15. Generic Transformation for Scalable Broadcast Encryption Schemes

    • Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
    Pages 276-292
  16. Authenticating Pervasive Devices with Human Protocols

    • Ari Juels, Stephen A. Weis
    Pages 293-308

Other Volumes

  1. Advances in Cryptology – CRYPTO 2005

Editors and Affiliations

  • New York University,  

    Victor Shoup

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access