rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540374329

Advances in Cryptology - Crypto 2006

by
  • ISBN13:

    9783540374329

  • ISBN10:

    3540374329

  • Format: Paperback
  • Copyright: 2006-09-15
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $109.99

Summary

This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held in Santa Barbara, California, USA in August 2006. The 34 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 250 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Table of Contents

Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffsp. 1
On the Power of the Randomized Iteratep. 22
Strengthening Digital Signatures Via Randomized Hashingp. 41
Round-Optimal Composable Blind Signatures in the Common Reference String Modelp. 60
On Signatures of Knowledgep. 78
Non-interactive Zaps and New Techniques for NIZKp. 97
Rankin's Constant and Blockwise Lattice Reductionp. 112
Lattice-Based Cryptographyp. 131
A Method for Making Password-Based Key Exchange Resilient to Server Compromisep. 142
Mitigating Dictionary Attacks on Password-Protected Local Storagep. 160
Rationality and Adversarial Behavior in Multi-party Computationp. 180
When Random Sampling Preserves Privacyp. 198
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Modelsp. 214
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secretsp. 232
On Forward-Secure Storagep. 251
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure Onep. 271
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)p. 290
Fast Algorithms for the Free Riders Problem in Broadcast Encryptionp. 308
The Number Field Sieve in the Medium Prime Casep. 326
Inverting HFE Is Quasipolynomialp. 345
Cryptanalysis of 2R[superscript -] Schemesp. 357
Receipt-Free Universally-Verifiable Voting with Everlasting Privacyp. 373
Cryptographic Protocols for Electronic Votingp. 393
Asymptotically Optimal Two-Round Perfectly Secure Message Transmissionp. 394
Random Selection with an Adversarial Majorityp. 409
Oblivious Transfer and Linear Functionsp. 427
On Expected Constant-Round Protocols for Byzantine Agreementp. 445
Robust Multiparty Computation with Linear Communication Complexityp. 463
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computationp. 483
Scalable Secure Multiparty Computationp. 501 Algebrai
Computations over Small Fieldsp. 521
Automated Security Proofs with Sequences of Gamesp. 537
On Robust Combiners for Private Information Retrieval and Other Primitivesp. 555
On the Impossibility of Efficiently Combining Collision Resistant Hash Functionsp. 570
On the Higher Order Nonlinearities of Algebraic Immune Functionsp. 584
New Proofs for NMAC and HMAC: Security without Collision-Resistancep. 602
Author Indexp. 621
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program