LEADER 05034nam 22008535 450 001 9910483625903321 005 20251226202353.0 024 7 $a10.1007/11535218 035 $a(CKB)1000000000213164 035 $a(SSID)ssj0000315803 035 $a(PQKBManifestationID)11278077 035 $a(PQKBTitleCode)TC0000315803 035 $a(PQKBWorkID)10256340 035 $a(PQKB)11739230 035 $a(DE-He213)978-3-540-31870-5 035 $a(MiAaPQ)EBC3067721 035 $a(PPN)123096529 035 $a(EXLCZ)991000000000213164 100 $a20101220d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology - CRYPTO 2005 $e25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings /$fedited by Victor Shoup 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 572 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3621 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-31870-4 311 08$a3-540-28114-2 320 $aIncludes bibliographical references and index. 327 $aEfficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characterizations of Non-interactive Zero-Knowledge -- Impossibility and Feasibility Results for Zero Knowledge with Public Keys -- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors -- A Formal Treatment of Onion Routing -- Simple and Efficient Shuffling with Provable Correctness and ZK Privacy -- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions -- Private Searching on Streaming Data -- Privacy-Preserving Set Operations -- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys -- Generic Transformation for Scalable Broadcast Encryption Schemes -- Authenticating Pervasive Devices with Human Protocols -- Secure Communications over Insecure Channels Based on Short Authenticated Strings -- On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes -- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields -- Secure Computation Without Authentication -- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator -- Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems -- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes -- Merkle-Damgård Revisited: How to Construct a Hash Function -- On the Generic Insecurity of the Full Domain Hash -- New Monotones and Lower Bounds inUnconditional Two-Party Computation -- One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption -- A Quantum Cipher with Near Optimal Key-Recycling -- An Efficient CDH-Based Signature Scheme with a Tight Security Reduction -- Improved Security Analyses for CBC MACs -- HMQV: A High-Performance Secure Diffie-Hellman Protocol. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3621 606 $aCoding theory 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aComputers and civilization 606 $aCoding and Information Theory 606 $aCryptology 606 $aComputer Communication Networks 606 $aOperating Systems 606 $aDiscrete Mathematics in Computer Science 606 $aComputers and Society 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aOperating systems (Computers). 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aComputers and civilization. 615 14$aCoding and Information Theory. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputers and Society. 676 $a003.54 701 $aShoup$b Victor$0725699 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483625903321 996 $aAdvances in cryptology-- CRYPTO 2005$94204919 997 $aUNINA