LEADER 04299nam 2200649 450 001 996465519903316 005 20220428223249.0 010 $a1-280-94372-6 010 $a9786610943722 010 $a3-540-72540-7 024 7 $a10.1007/978-3-540-72540-4 035 $a(CKB)1000000000490218 035 $a(EBL)3061526 035 $a(SSID)ssj0000288099 035 $a(PQKBManifestationID)11204351 035 $a(PQKBTitleCode)TC0000288099 035 $a(PQKBWorkID)10373025 035 $a(PQKB)11452287 035 $a(DE-He213)978-3-540-72540-4 035 $a(MiAaPQ)EBC3061526 035 $a(MiAaPQ)EBC6700627 035 $a(Au-PeEL)EBL6700627 035 $a(PPN)123162394 035 $a(EXLCZ)991000000000490218 100 $a20220428d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aAdvances in cryptology - EUROCRYPT 2007 $e26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, proceedings /$fedited by Moni Naor 205 $a1st ed. 2007. 210 1$aBerlin, Germany ;$aNew York, New York :$cSpringer,$d[2007] 210 4$d©2007 215 $a1 online resource (602 p.) 225 1 $aSecurity and Cryptology ;$v4515 300 $aIncludes index. 311 $a3-540-72539-3 320 $aIncludes bibliographical references and index. 327 $aChosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities -- Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don?t Exist -- The Collision Intractability of MDC-2 in the Ideal-Cipher Model -- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries -- Revisiting the Efficiency of Malicious Two-Party Computation -- Efficient Two-Party Secure Computation on Committed Inputs -- Universally Composable Multi-party Computation Using Tamper-Proof Hardware -- Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model -- Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability -- Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility -- Zero Knowledge and Soundness Are Symmetric -- Mesh Signatures -- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks -- Batch Verification of Short Signatures -- Cryptanalysis of SFLASH with Slightly Modified Parameters -- Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy -- Secure Computation from Random Error Correcting Codes -- Round-Efficient Secure Computation in Point-to-Point Networks -- Atomic Secure Multi-party Multiplication with Low Communication -- Cryptanalysis of the Sidelnikov Cryptosystem -- Toward a Rigorous Variation of Coppersmith?s Algorithm on Three Variables -- An L (1/3?+??) Algorithm for the Discrete Logarithm Problem for Low Degree Curves -- General Ad Hoc Encryption from Exponent Inversion IBE -- Non-interactive Proofs for Integer Multiplication -- Ate Pairing on Hyperelliptic Curves -- Ideal Multipartite Secret Sharing Schemes -- Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit -- Divisible E-Cash Systems Can Be Truly Anonymous -- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security -- Range Extension for Weak PRFs; The Good, the Bad, and the Ugly -- Feistel Networks Made Public, and Applications -- Oblivious-Transfer Amplification -- Simulatable Adaptive Oblivious Transfer. 410 0$aSecurity and Cryptology ;$v4515 606 $aCryptography$vCongresses 606 $aComputers$xAccess control$vCongresses 606 $aData transmission systems$xSecurity measures$vCongresses 615 0$aCryptography 615 0$aComputers$xAccess control 615 0$aData transmission systems$xSecurity measures 676 $a005.8 702 $aNaor$b Moni$f1961- 712 02$aInternational Association for Cryptologic Research. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465519903316 996 $aAdvances in Cryptology - EUROCRYPT 2007$9772034 997 $aUNISA