Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 2005
Preface and frontmatter
Page
Title
1-18
Cryptanalysis of the Hash Functions MD4 and RIPEMD
19-35
How to Break MD5 and Other Hash Functions
36-57
Collisions of SHA-0 and Reduced SHA-1
58-77
Reducing Complexity Assumptions for Statistically-Hiding Commitment
78-95
Smooth Projective Hashing and Two-Message Oblivious Transfer
96-113
On Robust Combiners for Oblivious Transfer and Other Primitives
114-127
Efficient Identity-Based Encryption Without Random Oracles
128-146
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
147-163
Secure Remote Authentication Using Biometric Data
164-180
Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
181-197
3-Move Undeniable Signature Scheme
198-214
Group Signatures with Efficient Concurrent Join
215-233
Floating-Point LLL Revisited
234-250
Practical Cryptography in High Dimensional Tori
251-267
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
268-284
Computational Indistinguishability Between Quantum States and Its Cryptographic Application
285-301
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
302-321
Compact E-Cash
322-340
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract)
341-353
Differential Cryptanalysis for Multivariate Schemes
354-370
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
371-386
Partial Key Exposure Attacks on RSA up to Full Size Exponents
387-403
The RSA Group is Pseudo-Free
404-421
Universally Composable Password-Based Key Exchange
422-439
Mercurial Commitments with Applications to Zero-Knowledge Sets
440-456
Hierarchical Identity Based Encryption with Constant Size Ciphertext
457-473
Fuzzy Identity-Based Encryption
474-490
Second Preimages on n-Bit Hash Functions for Much Less than 2
n
Work
491-506
Predicting and Distinguishing Attacks on RC4 Keystream Generator
507-525
Related-Key Boomerang and Rectangle Attacks
526-541
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
542-558
Public Traceability in Traitor Tracing Schemes
559-574
One-Way Chain Based Broadcast Encryption Schemes