Coverart for item
The Resource Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings, Alfred Menezes (ed.)

Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings, Alfred Menezes (ed.)

Label
Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
Title
Advances in cryptology - CRYPTO 2007
Title remainder
27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
Statement of responsibility
Alfred Menezes (ed.)
Title variation
CRYPTO 2007
Creator
Contributor
Subject
Genre
Language
eng
Summary
Annotation
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
C79 2007eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2007
http://bibfra.me/vocab/lite/meetingName
CRYPTO (Conference)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1965-
http://library.link/vocab/relatedWorkOrContributorName
  • Menezes, A. J.
  • International Association for Cryptologic Research
Series statement
Lecture notes in computer science,
Series volume
4622
http://library.link/vocab/subjectName
  • Computers
  • Cryptography
  • Cryptography
  • Computers
  • Informatique
  • Computers
  • Cryptography
Summary expansion
This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in August 2007. Thirty-three full papers are presented along with one important invited lecture. The papers address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis. In addition, readers will discover many advanced and emerging applications
Label
Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings, Alfred Menezes (ed.)
Instantiates
Publication
Note
  • International conference proceedings
  • "International Association for Cryptologic Research"--Preface
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Practical cryptanalysis of SFLASH / Vivien Dubois [and others] -- Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 / Pierre-Alain Fouque, Gaetan Leurent, and Phong Q. Nguyen -- How should we solve search problems privately? / Amos Beimel [and others] -- Public key encryption that allows PIR queries / Dan Boneh [and others] -- Information security economics--and beyond / Ross Anderson and Tyler Moore -- Cryptography with constant input locality / Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz -- Universally-composable two-party computation in two rounds / Omer Horvitz and Jonathan Katz -- Indistinguishability amplification / Ueli Maurer, Krzysztof Pietrzak, and Renato Renner -- A hybrid lattice-reduction and meet-in-the-middle attack against NTRU / Nick Howgrave-Graham -- Improved analysis of kannan's shortest lattice vector algorithm (extended abstract) / Guillaume Hanrot and Damien Stehl -- Domain extension of public random functions: beyond the birthday barrier / Ueli Maurer and Stefano Tessaro Random oracles and auxiliary input / Dominique Unruh -- Security-amplifying combiners for collision-resistant hash functions / Marc Fischlin and Anja Lehmann -- Hash functions and the (amplified) boomerang attack / Antoine Joux and Thomas Peyrin -- Amplifying collision resistance: a complexity-theoretic treatment / Ran Canetti [and others] -- How many oblivious transfers are needed for secure multiparty computation? / Danny Harnik, Yuval Ishai, and Eyal Kushilevitz -- Simulatable VRFs with applications to multi-theorem NIZK / Melissa Chase and Anna Lysyanskaya -- Cryptography in the multi-string model / Jens Groth and Rafail Ostrovsky -- Secure identification and QKD in the bounded-quantum-storage model / Ivan B. Damgard -- A tight high-order entropic quantum uncertainty relation with applications / Ivan B. Damgard -- Finding small roots of bivariate integer polynomial equations: a direct approach / Jean-Sebastien Coron -- A polynomial time attack on RSA with private CRT-exponents smaller than N00̇73 / Ellen Jochemsz and Alexander May -- Invertible Universal hashing and the TET encryption mode / Shai Halevi -- Reducing trust in the PKG in identity based cryptosystems / Vipul Goyal -- Pirate evolution: how to make the most of your traitor keys / Aggelos Kiayias and Serdar Pehlivanoglu -- A security analysis of the NIST SP 800-90 elliptic curve random number generator / Daniel R.L. Brown and Kristian Gjøsteen -- A generalization of DDH with applications to protocol analysis and computational soundness / Emmanuel Bresson [and others] -- Chernoff-type direct product theorems / Russell Impagliazzo, Ragesh Jaiswal, and Valentine Kabanets -- Rerandomizable RCCA encryption / Manoj Prabhakaran and Mike Rosulek -- Deterministic and efficiently searchable encryption / Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill -- Secure hybrid encryption from weakened key encapsulation / Dennis Hofheinz and Eike Kiltz -- Scalable and unconditionally secure multiparty computation / Ivan Damgard and Jesper Buus Nielsen -- On secure multi-party computation in black-box groups / Yvo Desmedt [and others] -- A note on secure computation of the Moore-Penrose pseudoinverse and its application to secure linear algebra / Ronald Cramer, Eike Kiltz, and Carles Padr
Control code
184932472
Dimensions
unknown
Extent
1 online resource (xiv, 630 pages)
Form of item
online
Isbn
9783540741428
Lccn
2007932207
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-540-74143-5
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-74142-8
Specific material designation
remote
System control number
(OCoLC)184932472
Label
Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings, Alfred Menezes (ed.)
Publication
Note
  • International conference proceedings
  • "International Association for Cryptologic Research"--Preface
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Practical cryptanalysis of SFLASH / Vivien Dubois [and others] -- Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 / Pierre-Alain Fouque, Gaetan Leurent, and Phong Q. Nguyen -- How should we solve search problems privately? / Amos Beimel [and others] -- Public key encryption that allows PIR queries / Dan Boneh [and others] -- Information security economics--and beyond / Ross Anderson and Tyler Moore -- Cryptography with constant input locality / Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz -- Universally-composable two-party computation in two rounds / Omer Horvitz and Jonathan Katz -- Indistinguishability amplification / Ueli Maurer, Krzysztof Pietrzak, and Renato Renner -- A hybrid lattice-reduction and meet-in-the-middle attack against NTRU / Nick Howgrave-Graham -- Improved analysis of kannan's shortest lattice vector algorithm (extended abstract) / Guillaume Hanrot and Damien Stehl -- Domain extension of public random functions: beyond the birthday barrier / Ueli Maurer and Stefano Tessaro Random oracles and auxiliary input / Dominique Unruh -- Security-amplifying combiners for collision-resistant hash functions / Marc Fischlin and Anja Lehmann -- Hash functions and the (amplified) boomerang attack / Antoine Joux and Thomas Peyrin -- Amplifying collision resistance: a complexity-theoretic treatment / Ran Canetti [and others] -- How many oblivious transfers are needed for secure multiparty computation? / Danny Harnik, Yuval Ishai, and Eyal Kushilevitz -- Simulatable VRFs with applications to multi-theorem NIZK / Melissa Chase and Anna Lysyanskaya -- Cryptography in the multi-string model / Jens Groth and Rafail Ostrovsky -- Secure identification and QKD in the bounded-quantum-storage model / Ivan B. Damgard -- A tight high-order entropic quantum uncertainty relation with applications / Ivan B. Damgard -- Finding small roots of bivariate integer polynomial equations: a direct approach / Jean-Sebastien Coron -- A polynomial time attack on RSA with private CRT-exponents smaller than N00̇73 / Ellen Jochemsz and Alexander May -- Invertible Universal hashing and the TET encryption mode / Shai Halevi -- Reducing trust in the PKG in identity based cryptosystems / Vipul Goyal -- Pirate evolution: how to make the most of your traitor keys / Aggelos Kiayias and Serdar Pehlivanoglu -- A security analysis of the NIST SP 800-90 elliptic curve random number generator / Daniel R.L. Brown and Kristian Gjøsteen -- A generalization of DDH with applications to protocol analysis and computational soundness / Emmanuel Bresson [and others] -- Chernoff-type direct product theorems / Russell Impagliazzo, Ragesh Jaiswal, and Valentine Kabanets -- Rerandomizable RCCA encryption / Manoj Prabhakaran and Mike Rosulek -- Deterministic and efficiently searchable encryption / Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill -- Secure hybrid encryption from weakened key encapsulation / Dennis Hofheinz and Eike Kiltz -- Scalable and unconditionally secure multiparty computation / Ivan Damgard and Jesper Buus Nielsen -- On secure multi-party computation in black-box groups / Yvo Desmedt [and others] -- A note on secure computation of the Moore-Penrose pseudoinverse and its application to secure linear algebra / Ronald Cramer, Eike Kiltz, and Carles Padr
Control code
184932472
Dimensions
unknown
Extent
1 online resource (xiv, 630 pages)
Form of item
online
Isbn
9783540741428
Lccn
2007932207
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-540-74143-5
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-74142-8
Specific material designation
remote
System control number
(OCoLC)184932472

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...