International Association for Cryptologic Research


Call for papers
Submit paper
Accepted papers
Rump session
General Info
Travel Info
Book Accommodation
Related Events

List of papers accepted to Eurocrypt 2005

Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
Claude Crepeau and Daniel Gottesman and Adam Smith
(McGill University and Perimeter Institute and Weizmann Institute)
Efficient Identity-Based Encryption Without Random Oracles
Brent Waters
(Stanford University)
Predicting and Distinguishing Attacks on RC4 Keystream Generator
Itsik Mantin
(NDS Technologies)
3-Move Undeniable Signature Scheme
Kaoru Kurosawa and Swee-Huay Heng
(Ibaraki University and Multimedia University)
Secure Remote Authentication Using Biometric Data
Xavier Boyen and Yevgeniy Dodis and Jonathan Katz and Rafail Ostrovsky and Adam Smith
(Voltage Security and NYU and University of Maryland and UCLA and MIT)
Differential Cryptanalysis for Multivariate Schemes
Pierre-Alain Fouque and Louis Granboulan and Jacques Stern
(Ecole normale superieure)
Smooth Projective Hashing and Two-Message Oblivious Transfer
Yael Tauman Kalai
Stronger security bounds for Wegman-Carter-Shoup authenticators
Daniel J. Bernstein
(University of Illinois at Chicago)
Collisions of SHA-0 and Reduced SHA-1
Eli Biham and Rafi Chen and Antoine Joux and Patrick Carribault and William Jalby and Christophe Lemuet
(Technion and DGA and Bull and UVSQ)
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
Ludovic Perret
Second Preimages on n-bit Hash Functions for Much Less than 2n Work
John Kelsey and Bruce Schneier
(NIST and Counterpane Internet Security)
Compact E-Cash
Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya
(IBM Research and MIT and Brown University)
Reducing Complexity Assumptions for Statistically-Hiding Commitment
Iftach Haitner and Omer Horvitz and Jonathan Katz and Chiu-Yuen Koo and Ruggero Morselli and Ronen Shaltiel
(Weizmann Institute and University of Maryland and University of Haifa)
On Robust Combiners for Oblivious Transfer and other Primitives
Danny Harnik and Joe Kilian and Moni Naor and Omer Reingold and Alon Rosen
(Weizmann Institute and Yianilos Labs and MIT)
On the Impossibility of Highly Efficient Blockcipher-Based Hash Functions
John Black and Martin Cochran and Thomas Shrimpton
(University of Colorado at Boulder and Portland State University)
Group Signatures with Efficient Concurrent Join
Aggelos Kiayias and Moti Yung
(University of Connecticut and Columbia University)
One-way chain based broadcast encryption scheme
Nam-su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo,
(Seoul National University and Korea university)
Practical Cryptography in High Dimensional Tori
Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David Woodruff
(MIT and University of Bristol and UC Irvine)
Computational Indistinguishability between Quantum States and Its Applications
Akinori Kawachi and Takeshi Koshiba and Harumichi Nishimura and Tomoyuki Yamakami
(Tokyo Institute of Technology and Fujitsu Laboratories and JST and Trent University)
Partial Key Exposure Attacks on RSA up to Full Size Exponents
Matthias Ernst and Ellen Jochemsz and Alexander May and Benne de Weger
(University of Paderborn and Eindhoven University of Technology)
Floating-Point LLL Revisited
Phong Q. Nguyen and Damien Stehle
(CNRS/Ecole normale superieure and LORIA)
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa and Victor Shoup
(NTT Laboratories and IBM Watson and Ibaraki University and New York University)
The RSA group is Pseudo-Free
Daniele Micciancio
Universally Composable Password-Based Key Exchange
Ran Canetti and Shai Halevi and Jonathan Katz and Yehuda Lindell and Phil MacKenzie
(IBM and University of Maryland and Bar-Ilan University and DoCoMo Labs)
Related-Key Boomerang and Rectangle Attacks
Eli Biham and Orr Dunkelman and Nathan Keller
(Technion and Hebrew University)
Fuzzy Identity-Based Encryption
Amit Sahai and Brent Waters
(U.C.L.A. and Stanford University)
Cryptanalysis for Hash Functions MD4 and RIPEMD
Xiaoyun Wang and Xuejia Lai and Dengguo Feng and Hui Chen and Xiuyuan Yu
(Shandong University and Shanghai Jiaotong University and Chinese Academy of Science and Shandong University and Huangzhou Teacher College)
How to Break MD5 and Other Hash Functions
Xiaoyun Wang and Hongbo Yu
(Shandong University)
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience
Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek
(ETH Zurich and University of Aarhus)
Mercurial Commitments with Applications to Zero-Knowledge Sets
Melissa Chase and Alex Healy and Anna Lysyanskaya and Tal Malkin and Leonid Reyzin
(Brown University and Harvard University and Columbia University and Boston University)
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Dan Boneh and Xavier Boyen and Eu-Jin Goh
(Stanford University and Voltage Inc)
Public Traceability in Traitor Tracing Schemes
Herve Chabanne and Duong Hieu Phan and David Pointcheval
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
Johannes Bloemer and Alex May
(University of Paderborn)