Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/eurocrypt/eurocrypt2005.bht:"
@inproceedings{DBLP:conf/eurocrypt/AbeGKS05, author = {Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa and Victor Shoup}, editor = {Ronald Cramer}, title = {Tag-KEM/DEM: {A} New Framework for Hybrid Encryption and {A} New Analysis of Kurosawa-Desmedt {KEM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {128--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_8}, doi = {10.1007/11426639\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbeGKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bernstein05, author = {Daniel J. Bernstein}, editor = {Ronald Cramer}, title = {Stronger Security Bounds for Wegman-Carter-Shoup Authenticators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {164--180}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_10}, doi = {10.1007/11426639\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bernstein05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamCJCLJ05, author = {Eli Biham and Rafi Chen and Antoine Joux and Patrick Carribault and Christophe Lemuet and William Jalby}, editor = {Ronald Cramer}, title = {Collisions of {SHA-0} and Reduced {SHA-1}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {36--57}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_3}, doi = {10.1007/11426639\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamCJCLJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamDK05, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Ronald Cramer}, title = {Related-Key Boomerang and Rectangle Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {507--525}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_30}, doi = {10.1007/11426639\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlackCS05, author = {John Black and Martin Cochran and Thomas Shrimpton}, editor = {Ronald Cramer}, title = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {526--541}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_31}, doi = {10.1007/11426639\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlackCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlomerM05, author = {Johannes Bl{\"{o}}mer and Alexander May}, editor = {Ronald Cramer}, title = {A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {251--267}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_15}, doi = {10.1007/11426639\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlomerM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehBG05, author = {Dan Boneh and Xavier Boyen and Eu{-}Jin Goh}, editor = {Ronald Cramer}, title = {Hierarchical Identity Based Encryption with Constant Size Ciphertext}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {440--456}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_26}, doi = {10.1007/11426639\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyenDKOS05, author = {Xavier Boyen and Yevgeniy Dodis and Jonathan Katz and Rafail Ostrovsky and Adam D. Smith}, editor = {Ronald Cramer}, title = {Secure Remote Authentication Using Biometric Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {147--163}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_9}, doi = {10.1007/11426639\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyenDKOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CamenischHL05, author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya}, editor = {Ronald Cramer}, title = {Compact E-Cash}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {302--321}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_18}, doi = {10.1007/11426639\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CamenischHL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiHKLM05, author = {Ran Canetti and Shai Halevi and Jonathan Katz and Yehuda Lindell and Philip D. MacKenzie}, editor = {Ronald Cramer}, title = {Universally Composable Password-Based Key Exchange}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {404--421}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_24}, doi = {10.1007/11426639\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiHKLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChabannePP05, author = {Herv{\'{e}} Chabanne and Duong Hieu Phan and David Pointcheval}, editor = {Ronald Cramer}, title = {Public Traceability in Traitor Tracing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {542--558}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_32}, doi = {10.1007/11426639\_32}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChabannePP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaseHLMR05, author = {Melissa Chase and Alexander Healy and Anna Lysyanskaya and Tal Malkin and Leonid Reyzin}, editor = {Ronald Cramer}, title = {Mercurial Commitments with Applications to Zero-Knowledge Sets}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {422--439}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_25}, doi = {10.1007/11426639\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaseHLMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CrepeauGS05, author = {Claude Cr{\'{e}}peau and Daniel Gottesman and Adam D. Smith}, editor = {Ronald Cramer}, title = {Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {285--301}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_17}, doi = {10.1007/11426639\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CrepeauGS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DijkGPRSSW05, author = {Marten van Dijk and Robert Granger and Dan Page and Karl Rubin and Alice Silverberg and Martijn Stam and David P. Woodruff}, editor = {Ronald Cramer}, title = {Practical Cryptography in High Dimensional Tori}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {234--250}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_14}, doi = {10.1007/11426639\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DijkGPRSSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ErnstJMW05, author = {Matthias Ernst and Ellen Jochemsz and Alexander May and Benne de Weger}, editor = {Ronald Cramer}, title = {Partial Key Exposure Attacks on {RSA} up to Full Size Exponents}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {371--386}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_22}, doi = {10.1007/11426639\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/ErnstJMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FouqueGS05, author = {Pierre{-}Alain Fouque and Louis Granboulan and Jacques Stern}, editor = {Ronald Cramer}, title = {Differential Cryptanalysis for Multivariate Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {341--353}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_20}, doi = {10.1007/11426639\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FouqueGS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HaitnerHKKMS05, author = {Iftach Haitner and Omer Horvitz and Jonathan Katz and Chiu{-}Yuen Koo and Ruggero Morselli and Ronen Shaltiel}, editor = {Ronald Cramer}, title = {Reducing Complexity Assumptions for Statistically-Hiding Commitment}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {58--77}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_4}, doi = {10.1007/11426639\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HaitnerHKKMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HarnikKNRR05, author = {Danny Harnik and Joe Kilian and Moni Naor and Omer Reingold and Alon Rosen}, editor = {Ronald Cramer}, title = {On Robust Combiners for Oblivious Transfer and Other Primitives}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {96--113}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_6}, doi = {10.1007/11426639\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HarnikKNRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HirtNP05, author = {Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek}, editor = {Ronald Cramer}, title = {Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {322--340}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_19}, doi = {10.1007/11426639\_19}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HirtNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JhoHCK0Y05, author = {Nam{-}Su Jho and Jung Yeon Hwang and Jung Hee Cheon and Myung{-}Hwan Kim and Dong Hoon Lee and Eun Sun Yoo}, editor = {Ronald Cramer}, title = {One-Way Chain Based Broadcast Encryption Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {559--574}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_33}, doi = {10.1007/11426639\_33}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JhoHCK0Y05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Kalai05, author = {Yael Tauman Kalai}, editor = {Ronald Cramer}, title = {Smooth Projective Hashing and Two-Message Oblivious Transfer}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {78--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_5}, doi = {10.1007/11426639\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Kalai05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KawachiKNY05, author = {Akinori Kawachi and Takeshi Koshiba and Harumichi Nishimura and Tomoyuki Yamakami}, editor = {Ronald Cramer}, title = {Computational Indistinguishability Between Quantum States and Its Cryptographic Application}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {268--284}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_16}, doi = {10.1007/11426639\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KawachiKNY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KelseyS05, author = {John Kelsey and Bruce Schneier}, editor = {Ronald Cramer}, title = {Second Preimages on n-Bit Hash Functions for Much Less than 2\({}^{\mbox{n}}\) Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {474--490}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_28}, doi = {10.1007/11426639\_28}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KelseyS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, editor = {Ronald Cramer}, title = {Group Signatures with Efficient Concurrent Join}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {198--214}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_12}, doi = {10.1007/11426639\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaH05, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Ronald Cramer}, title = {3-Move Undeniable Signature Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {181--197}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_11}, doi = {10.1007/11426639\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Mantin05, author = {Itsik Mantin}, editor = {Ronald Cramer}, title = {Predicting and Distinguishing Attacks on {RC4} Keystream Generator}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {491--506}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_29}, doi = {10.1007/11426639\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Mantin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Micciancio05, author = {Daniele Micciancio}, editor = {Ronald Cramer}, title = {The {RSA} Group is Pseudo-Free}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {387--403}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_23}, doi = {10.1007/11426639\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Micciancio05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NguenS05, author = {Phong Q. Nguyen and Damien Stehl{\'{e}}}, editor = {Ronald Cramer}, title = {Floating-Point {LLL} Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {215--233}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_13}, doi = {10.1007/11426639\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NguenS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Perret05, author = {Ludovic Perret}, editor = {Ronald Cramer}, title = {A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {354--370}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_21}, doi = {10.1007/11426639\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Perret05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SahaiW05, author = {Amit Sahai and Brent Waters}, editor = {Ronald Cramer}, title = {Fuzzy Identity-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {457--473}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_27}, doi = {10.1007/11426639\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SahaiW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangLFCY05, author = {Xiaoyun Wang and Xuejia Lai and Dengguo Feng and Hui Chen and Xiuyuan Yu}, editor = {Ronald Cramer}, title = {Cryptanalysis of the Hash Functions {MD4} and {RIPEMD}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {1--18}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_1}, doi = {10.1007/11426639\_1}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangLFCY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangY05, author = {Xiaoyun Wang and Hongbo Yu}, editor = {Ronald Cramer}, title = {How to Break {MD5} and Other Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {19--35}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_2}, doi = {10.1007/11426639\_2}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Waters05, author = {Brent Waters}, editor = {Ronald Cramer}, title = {Efficient Identity-Based Encryption Without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {114--127}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_7}, doi = {10.1007/11426639\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Waters05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2005, editor = {Ronald Cramer}, title = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b136415}, doi = {10.1007/B136415}, isbn = {3-540-25910-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.