skip to content
Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings Preview this item
ClosePreview this item
Checking...

Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings

Author: A J Menezes; International Association for Cryptologic Research.
Publisher: Berlin : Springer, 2007.
Series: Lecture notes in computer science, 4622.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
Annotation
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Print version:
CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.).
Advances in cryptology - CRYPTO 2007.
Berlin : Springer, 2007
(OCoLC)166763853
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: A J Menezes; International Association for Cryptologic Research.
ISBN: 9783540741435 3540741437 3540741429 9783540741428
OCLC Number: 184932472
Notes: International conference proceedings.
"International Association for Cryptologic Research"--Preface.
Description: 1 online resource (xiv, 630 pages) : illustrations.
Contents: Practical cryptanalysis of SFLASH / Vivien Dubois [and others] --
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 / Pierre-Alain Fouque, Gaetan Leurent, and Phong Q. Nguyen --
How should we solve search problems privately? / Amos Beimel [and others] --
Public key encryption that allows PIR queries / Dan Boneh [and others] --
Information security economics--and beyond / Ross Anderson and Tyler Moore --
Cryptography with constant input locality / Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz --
Universally-composable two-party computation in two rounds / Omer Horvitz and Jonathan Katz --
Indistinguishability amplification / Ueli Maurer, Krzysztof Pietrzak, and Renato Renner --
A hybrid lattice-reduction and meet-in-the-middle attack against NTRU / Nick Howgrave-Graham --
Improved analysis of kannan's shortest lattice vector algorithm (extended abstract) / Guillaume Hanrot and Damien Stehl --
Domain extension of public random functions: beyond the birthday barrier / Ueli Maurer and Stefano Tessaro Random oracles and auxiliary input / Dominique Unruh --
Security-amplifying combiners for collision-resistant hash functions / Marc Fischlin and Anja Lehmann --
Hash functions and the (amplified) boomerang attack / Antoine Joux and Thomas Peyrin --
Amplifying collision resistance: a complexity-theoretic treatment / Ran Canetti [and others] --
How many oblivious transfers are needed for secure multiparty computation? / Danny Harnik, Yuval Ishai, and Eyal Kushilevitz --
Simulatable VRFs with applications to multi-theorem NIZK / Melissa Chase and Anna Lysyanskaya --
Cryptography in the multi-string model / Jens Groth and Rafail Ostrovsky --
Secure identification and QKD in the bounded-quantum-storage model / Ivan B. Damgard --
A tight high-order entropic quantum uncertainty relation with applications / Ivan B. Damgard --
Finding small roots of bivariate integer polynomial equations: a direct approach / Jean-Sebastien Coron --
A polynomial time attack on RSA with private CRT-exponents smaller than N⁰̇⁰⁷³ / Ellen Jochemsz and Alexander May --
Invertible Universal hashing and the TET encryption mode / Shai Halevi --
Reducing trust in the PKG in identity based cryptosystems / Vipul Goyal --
Pirate evolution: how to make the most of your traitor keys / Aggelos Kiayias and Serdar Pehlivanoglu --
A security analysis of the NIST SP 800-90 elliptic curve random number generator / Daniel R.L. Brown and Kristian Gjøsteen --
A generalization of DDH with applications to protocol analysis and computational soundness / Emmanuel Bresson [and others] --
Chernoff-type direct product theorems / Russell Impagliazzo, Ragesh Jaiswal, and Valentine Kabanets --
Rerandomizable RCCA encryption / Manoj Prabhakaran and Mike Rosulek --
Deterministic and efficiently searchable encryption / Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill --
Secure hybrid encryption from weakened key encapsulation / Dennis Hofheinz and Eike Kiltz --
Scalable and unconditionally secure multiparty computation / Ivan Damgard and Jesper Buus Nielsen --
On secure multi-party computation in black-box groups / Yvo Desmedt [and others] --
A note on secure computation of the Moore-Penrose pseudoinverse and its application to secure linear algebra / Ronald Cramer, Eike Kiltz, and Carles Padr.
Series Title: Lecture notes in computer science, 4622.
Other Titles: CRYPTO 2007
Responsibility: Alfred Menezes (ed.).

Abstract:

This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in August 2007. The papers address current foundational,  Read more...

Reviews

Editorial reviews

Publisher Synopsis

Aus den Rezensionen:"... Fur den mathematisch weniger (Ieid)gepruften Leser bieten Anderson und Moore im langsten Text des Kompendiums eine Abhandlung uber die wirtschaftlichen Zusammenhange, die der Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/184932472> # Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "184932472" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/900806424#Place/berlin> ; # Berlin
    schema:about <http://experiment.worldcat.org/entity/work/data/900806424#Topic/cryptography> ; # Cryptography
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/900806424#Topic/informatique> ; # Informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/900806424#Topic/computers_access_control> ; # Computers--Access control
    schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
    schema:alternateName "CRYPTO 2007" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/22118664> ; # Alfred J. Menezes
    schema:contributor <http://viaf.org/viaf/141764476> ; # International Association for Cryptologic Research.
    schema:creator <http://experiment.worldcat.org/entity/work/data/900806424#Meeting/crypto_conference_27th_2007_santa_barbara_calif> ; # CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.)
    schema:datePublished "2007" ;
    schema:description "Practical cryptanalysis of SFLASH / Vivien Dubois [and others] -- Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 / Pierre-Alain Fouque, Gaetan Leurent, and Phong Q. Nguyen -- How should we solve search problems privately? / Amos Beimel [and others] -- Public key encryption that allows PIR queries / Dan Boneh [and others] -- Information security economics--and beyond / Ross Anderson and Tyler Moore -- Cryptography with constant input locality / Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz -- Universally-composable two-party computation in two rounds / Omer Horvitz and Jonathan Katz -- Indistinguishability amplification / Ueli Maurer, Krzysztof Pietrzak, and Renato Renner -- A hybrid lattice-reduction and meet-in-the-middle attack against NTRU / Nick Howgrave-Graham -- Improved analysis of kannan's shortest lattice vector algorithm (extended abstract) / Guillaume Hanrot and Damien Stehl -- Domain extension of public random functions: beyond the birthday barrier / Ueli Maurer and Stefano Tessaro Random oracles and auxiliary input / Dominique Unruh -- Security-amplifying combiners for collision-resistant hash functions / Marc Fischlin and Anja Lehmann -- Hash functions and the (amplified) boomerang attack / Antoine Joux and Thomas Peyrin -- Amplifying collision resistance: a complexity-theoretic treatment / Ran Canetti [and others] -- How many oblivious transfers are needed for secure multiparty computation? / Danny Harnik, Yuval Ishai, and Eyal Kushilevitz -- Simulatable VRFs with applications to multi-theorem NIZK / Melissa Chase and Anna Lysyanskaya -- Cryptography in the multi-string model / Jens Groth and Rafail Ostrovsky -- Secure identification and QKD in the bounded-quantum-storage model / Ivan B. Damgard -- A tight high-order entropic quantum uncertainty relation with applications / Ivan B. Damgard -- Finding small roots of bivariate integer polynomial equations: a direct approach / Jean-Sebastien Coron -- A polynomial time attack on RSA with private CRT-exponents smaller than N⁰̇⁰⁷³ / Ellen Jochemsz and Alexander May -- Invertible Universal hashing and the TET encryption mode / Shai Halevi -- Reducing trust in the PKG in identity based cryptosystems / Vipul Goyal -- Pirate evolution: how to make the most of your traitor keys / Aggelos Kiayias and Serdar Pehlivanoglu -- A security analysis of the NIST SP 800-90 elliptic curve random number generator / Daniel R.L. Brown and Kristian Gjøsteen -- A generalization of DDH with applications to protocol analysis and computational soundness / Emmanuel Bresson [and others] -- Chernoff-type direct product theorems / Russell Impagliazzo, Ragesh Jaiswal, and Valentine Kabanets -- Rerandomizable RCCA encryption / Manoj Prabhakaran and Mike Rosulek -- Deterministic and efficiently searchable encryption / Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill -- Secure hybrid encryption from weakened key encapsulation / Dennis Hofheinz and Eike Kiltz -- Scalable and unconditionally secure multiparty computation / Ivan Damgard and Jesper Buus Nielsen -- On secure multi-party computation in black-box groups / Yvo Desmedt [and others] -- A note on secure computation of the Moore-Penrose pseudoinverse and its application to secure linear algebra / Ronald Cramer, Eike Kiltz, and Carles Padr."@en ;
    schema:description "Annotation"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/900806424> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/166763853> ;
    schema:name "Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings"@en ;
    schema:productID "184932472" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/184932472#PublicationEvent/berlin_springer_2007> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/900806424#Agent/springer> ; # Springer
    schema:url <http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=4622> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-540-74142-8> ;
    schema:url <http://www.myilibrary.com?id=96985&ref=toc> ;
    schema:url <http://www.springerlink.com/openurl.asp?genre=book&isbn=978-3-540-74142-8> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/book/10.1007/978-3-540-74143-5> ;
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-540-74142-8> ;
    schema:url <http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=4622> ;
    schema:url <http://dx.doi.org/10.1007/978-3-540-74143-5> ;
    schema:url <http://site.ebrary.com/id/10189202> ;
    schema:url <http://link.springer.com/10.1007/978-3-540-74143-5> ;
    schema:url <http://www.myilibrary.com?id=96985> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/9783540741435> ;
    schema:workExample <http://worldcat.org/isbn/9783540741428> ;
    schema:workExample <http://worldcat.org/isbn/9783540741435> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-540-74143-5> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/184932472> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/900806424#Meeting/crypto_conference_27th_2007_santa_barbara_calif> # CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/900806424#Place/santa_barbara_calif> ; # Santa Barbara, Calif.)
    schema:name "CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/900806424#Place/santa_barbara_calif> # Santa Barbara, Calif.)
    a schema:Place ;
    schema:name "Santa Barbara, Calif.)" ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography"@en ;
    .

<http://viaf.org/viaf/141764476> # International Association for Cryptologic Research.
    a schema:Organization ;
    schema:name "International Association for Cryptologic Research." ;
    .

<http://viaf.org/viaf/22118664> # Alfred J. Menezes
    a schema:Person ;
    schema:birthDate "1965" ;
    schema:familyName "Menezes" ;
    schema:givenName "Alfred J." ;
    schema:givenName "A. J." ;
    schema:name "Alfred J. Menezes" ;
    .

<http://worldcat.org/isbn/9783540741428>
    a schema:ProductModel ;
    schema:isbn "3540741429" ;
    schema:isbn "9783540741428" ;
    .

<http://worldcat.org/isbn/9783540741435>
    a schema:ProductModel ;
    schema:isbn "3540741437" ;
    schema:isbn "9783540741435" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/184932472> ; # Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/oclc/166763853>
    a schema:CreativeWork ;
    rdfs:label "Advances in cryptology - CRYPTO 2007." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/184932472> ; # Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
    .

<http://www.worldcat.org/title/-/oclc/184932472>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/184932472> ; # Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
    schema:dateModified "2018-01-05" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.