Advances in Cryptology - CRYPTO 2006 | 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings | ISBN 9783540374329

Advances in Cryptology - CRYPTO 2006

26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings

herausgegeben von Cynthia Dwork
Buchcover Advances in Cryptology - CRYPTO 2006  | EAN 9783540374329 | ISBN 3-540-37432-9 | ISBN 978-3-540-37432-9

Advances in Cryptology - CRYPTO 2006

26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings

herausgegeben von Cynthia Dwork

Inhaltsverzeichnis

  • Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.
  • On the Power of the Randomized Iterate.
  • Strengthening Digital Signatures Via Randomized Hashing.
  • Round-Optimal Composable Blind Signatures in the Common Reference String Model.
  • On Signatures of Knowledge.
  • Non-interactive Zaps and New Techniques for NIZK.
  • Rankin’s Constant and Blockwise Lattice Reduction.
  • Lattice-Based Cryptography.
  • A Method for Making Password-Based Key Exchange Resilient to Server Compromise.
  • Mitigating Dictionary Attacks on Password-Protected Local Storage.
  • Rationality and Adversarial Behavior in Multi-party Computation.
  • When Random Sampling Preserves Privacy.
  • Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
  • Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.
  • On Forward-Secure Storage.
  • Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
  • Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).
  • Fast Algorithms for the Free Riders Problem in Broadcast Encryption.
  • The Number Field Sieve in the Medium Prime Case.
  • Inverting HFE Is Quasipolynomial.
  • Cryptanalysis of 2R? Schemes.
  • Receipt-Free Universally-Verifiable Voting with Everlasting Privacy.
  • Cryptographic Protocols for Electronic Voting.
  • Asymptotically Optimal Two-Round Perfectly Secure Message Transmission.
  • Random Selection with an Adversarial Majority.
  • Oblivious Transfer and Linear Functions.
  • On Expected Constant-Round Protocols for Byzantine Agreement.
  • Robust Multiparty Computation with Linear Communication Complexity.
  • On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.
  • Scalable Secure Multiparty Computation.
  • Algebraic Geometric Secret Sharing Schemes andSecure Multi-Party Computations over Small Fields.
  • Automated Security Proofs with Sequences of Games.
  • On Robust Combiners for Private Information Retrieval and Other Primitives.
  • On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.
  • On the Higher Order Nonlinearities of Algebraic Immune Functions.
  • New Proofs for NMAC and HMAC: Security Without Collision-Resistance.