Conferences in DBLP
Xiaoyun Wang , Xuejia Lai , Dengguo Feng , Hui Chen , Xiuyuan Yu Cryptanalysis of the Hash Functions MD4 and RIPEMD. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:1-18 [Conf ] Xiaoyun Wang , Hongbo Yu How to Break MD5 and Other Hash Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:19-35 [Conf ] Eli Biham , Rafi Chen , Antoine Joux , Patrick Carribault , Christophe Lemuet , William Jalby Collisions of SHA-0 and Reduced SHA-1. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:36-57 [Conf ] Iftach Haitner , Omer Horvitz , Jonathan Katz , Chiu-Yuen Koo , Ruggero Morselli , Ronen Shaltiel Reducing Complexity Assumptions for Statistically-Hiding Commitment. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:58-77 [Conf ] Yael Tauman Kalai Smooth Projective Hashing and Two-Message Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:78-95 [Conf ] Danny Harnik , Joe Kilian , Moni Naor , Omer Reingold , Alon Rosen On Robust Combiners for Oblivious Transfer and Other Primitives. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:96-113 [Conf ] Brent Waters Efficient Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:114-127 [Conf ] Masayuki Abe , Rosario Gennaro , Kaoru Kurosawa , Victor Shoup Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:128-146 [Conf ] Xavier Boyen , Yevgeniy Dodis , Jonathan Katz , Rafail Ostrovsky , Adam Smith Secure Remote Authentication Using Biometric Data. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:147-163 [Conf ] Daniel J. Bernstein Stronger Security Bounds for Wegman-Carter-Shoup Authenticators. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:164-180 [Conf ] Kaoru Kurosawa , Swee-Huay Heng 3-Move Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:181-197 [Conf ] Aggelos Kiayias , Moti Yung Group Signatures with Efficient Concurrent Join. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:198-214 [Conf ] Phong Q. Nguyen , Damien Stehlé Floating-Point LLL Revisited. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:215-233 [Conf ] Marten van Dijk , Robert Granger , Dan Page , Karl Rubin , Alice Silverberg , Martijn Stam , David P. Woodruff Practical Cryptography in High Dimensional Tori. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:234-250 [Conf ] Johannes Blömer , Alexander May A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:251-267 [Conf ] Akinori Kawachi , Takeshi Koshiba , Harumichi Nishimura , Tomoyuki Yamakami Computational Indistinguishability Between Quantum States and Its Cryptographic Application. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:268-284 [Conf ] Claude Crépeau , Daniel Gottesman , Adam Smith Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:285-301 [Conf ] Jan Camenisch , Susan Hohenberger , Anna Lysyanskaya Compact E-Cash. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:302-321 [Conf ] Martin Hirt , Jesper Buus Nielsen , Bartosz Przydatek Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:322-340 [Conf ] Pierre-Alain Fouque , Louis Granboulan , Jacques Stern Differential Cryptanalysis for Multivariate Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:341-353 [Conf ] Ludovic Perret A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:354-370 [Conf ] Matthias Ernst , Ellen Jochemsz , Alexander May , Benne de Weger Partial Key Exposure Attacks on RSA up to Full Size Exponents. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:371-386 [Conf ] Daniele Micciancio The RSA Group is Pseudo-Free. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:387-403 [Conf ] Ran Canetti , Shai Halevi , Jonathan Katz , Yehuda Lindell , Philip D. MacKenzie Universally Composable Password-Based Key Exchange. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:404-421 [Conf ] Melissa Chase , Alexander Healy , Anna Lysyanskaya , Tal Malkin , Leonid Reyzin Mercurial Commitments with Applications to Zero-Knowledge Sets. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:422-439 [Conf ] Dan Boneh , Xavier Boyen , Eu-Jin Goh Hierarchical Identity Based Encryption with Constant Size Ciphertext. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:440-456 [Conf ] Amit Sahai , Brent Waters Fuzzy Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:457-473 [Conf ] John Kelsey , Bruce Schneier Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:474-490 [Conf ] Itsik Mantin Predicting and Distinguishing Attacks on RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:491-506 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller Related-Key Boomerang and Rectangle Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:507-525 [Conf ] John Black , Martin Cochran , Thomas Shrimpton On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:526-541 [Conf ] Hervé Chabanne , Duong Hieu Phan , David Pointcheval Public Traceability in Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:542-558 [Conf ] Nam-Su Jho , Jung Yeon Hwang , Jung Hee Cheon , Myung-Hwan Kim , Dong Hoon Lee , Eun Sun Yoo One-Way Chain Based Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:559-574 [Conf ]