Borrow it
 Architecture Library
 Bizzell Memorial Library
 Boorstin Collection
 Chinese Literature Translation Archive
 Engineering Library
 Fine Arts Library
 Harry W. Bass Business History Collection
 History of Science Collections
 John and Mary Nichols Rare Books and Special Collections
 Library Service Center
 Price College Digital Library
 Western History Collections
The Resource Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)
Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)
Resource Information
The item Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings, edited by Ronald Cramer, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries.This item is available to borrow from all library branches.
Resource Information
The item Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings, edited by Ronald Cramer, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries.
This item is available to borrow from all library branches.
 Summary
 These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg? ard was responsible for local organization. TheEurocrypt2005ProgramCommittee(PC)consistedof30internationally renowned experts. Their names and a?liations are listed on pages VII and VIII of these proceedings. By the November 15, 2004 submission deadline the PC had received a total of 190 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, were committed to the IACR Web Review System. These were taken as the starting point for the PCwideWebbaseddiscussionphase.Duringthisphase,additionalreportswere provided as needed, and the PC eventually had some 700 reports at its disposal. In addition, the discussions generated more than 850 messages, all posted in the system. During the entire PC phase, which started in August 2003 with my earliest invitations to PC members and which continued until March 2005, more than 1000 email messages were communicated. Moreover, the PC received much appreciated assistance from a large body of external reviewers. Their names are listed on page VIII of these proceedings
 Language

 eng
 eng
 Edition
 1st ed. 2005.
 Extent
 1 online resource (XIV, 578 p.)
 Note
 Bibliographic Level Mode of Issuance: Monograph
 Contents

 Cryptanalysis I
 Cryptanalysis of the Hash Functions MD4 and RIPEMD
 How to Break MD5 and Other Hash Functions
 Collisions of SHA0 and Reduced SHA1
 Theory I
 Reducing Complexity Assumptions for StatisticallyHiding Commitment
 Smooth Projective Hashing and TwoMessage Oblivious Transfer
 On Robust Combiners for Oblivious Transfer and Other Primitives
 Encryption I
 Efficient IdentityBased Encryption Without Random Oracles
 TagKEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of KurosawaDesmedt KEM
 Signatures and Authentication
 Secure Remote Authentication Using Biometric Data
 Stronger Security Bounds for WegmanCarterShoup Authenticators
 3Move Undeniable Signature Scheme
 Group Signatures with Efficient Concurrent Join
 Algebra and Number Theory I
 FloatingPoint LLL Revisited
 Practical Cryptography in High Dimensional Tori
 A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
 Quantum Cryptography
 Computational Indistinguishability Between Quantum States and Its Cryptographic Application
 Approximate Quantum ErrorCorrecting Codes and Secret Sharing Schemes
 Secure Protocols
 Compact ECash
 Cryptographic Asynchronous Multiparty Computation with Optimal Resilience
 Algebra and Number Theory II
 Differential Cryptanalysis for Multivariate Schemes
 A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
 Partial Key Exposure Attacks on RSA up to Full Size Exponents
 The RSA Group is PseudoFree
 Theory II
 Universally Composable PasswordBased Key Exchange
 Mercurial Commitments with Applications to ZeroKnowledge Sets
 Encryption II
 Hierarchical Identity Based Encryption with Constant Size Ciphertext
 Fuzzy IdentityBased Encryption
 Cryptanalysis II
 Second Preimages on nBit Hash Functions for Much Less than 2 n Work
 Predicting and Distinguishing Attacks on RC4 Keystream Generator
 RelatedKey Boomerang and Rectangle Attacks
 On the Impossibility of HighlyEfficient BlockcipherBased Hash Functions
 Broadcast Encryption and Traitor Tracing
 Public Traceability in Traitor Tracing Schemes
 OneWay Chain Based Broadcast Encryption Schemes
 Isbn
 9783540259107
 Label
 Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings
 Title
 Advances in Cryptology – EUROCRYPT 2005
 Title remainder
 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings
 Statement of responsibility
 edited by Ronald Cramer
 Subject

 Operating systems (Computers)
 Operating Systems
 Coding theory
 Computer software
 Coding and Information Theory
 Algorithm Analysis and Problem Complexity
 Cryptology
 Computer Communication Networks
 Data encryption (Computer science)
 Computer Communication Networks
 Computational complexity
 Discrete Mathematics in Computer Science
 Language

 eng
 eng
 Summary
 These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science Department of the University of Aarhus, Denmark. As General Chair, Ivan Damg? ard was responsible for local organization. TheEurocrypt2005ProgramCommittee(PC)consistedof30internationally renowned experts. Their names and a?liations are listed on pages VII and VIII of these proceedings. By the November 15, 2004 submission deadline the PC had received a total of 190 submissions via the IACR Electronic Submission Server. The subsequent selection process was divided into two phases, as usual. In the review phase each submission was carefully scrutinized by at least three independent reviewers, and the review reports, often extensive, were committed to the IACR Web Review System. These were taken as the starting point for the PCwideWebbaseddiscussionphase.Duringthisphase,additionalreportswere provided as needed, and the PC eventually had some 700 reports at its disposal. In addition, the discussions generated more than 850 messages, all posted in the system. During the entire PC phase, which started in August 2003 with my earliest invitations to PC members and which continued until March 2005, more than 1000 email messages were communicated. Moreover, the PC received much appreciated assistance from a large body of external reviewers. Their names are listed on page VIII of these proceedings
 Dewey number
 003.54
 http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
 2broewmn7h8
 Image bit depth
 0
 Language note
 English
 LC call number
 QA268
 Literary form
 non fiction
 http://bibfra.me/vocab/lite/meetingDate
 2005
 http://bibfra.me/vocab/lite/meetingName
 EUROCRYPT
 Nature of contents
 dictionaries
 http://library.link/vocab/relatedWorkOrContributorName
 Cramer, Ronald.
 Series statement
 Security and Cryptology
 Series volume
 3494
 http://library.link/vocab/subjectName

 Coding theory
 Data encryption (Computer science)
 Computer Communication Networks
 Operating systems (Computers)
 Computer software
 Computational complexity
 Coding and Information Theory
 Cryptology
 Computer Communication Networks
 Operating Systems
 Algorithm Analysis and Problem Complexity
 Discrete Mathematics in Computer Science
 Label
 Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)
 Note
 Bibliographic Level Mode of Issuance: Monograph
 Antecedent source
 mixed
 Bibliography note
 Includes bibliographical references and index
 Carrier category
 online resource
 Carrier category code
 cr
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Contents
 Cryptanalysis I  Cryptanalysis of the Hash Functions MD4 and RIPEMD  How to Break MD5 and Other Hash Functions  Collisions of SHA0 and Reduced SHA1  Theory I  Reducing Complexity Assumptions for StatisticallyHiding Commitment  Smooth Projective Hashing and TwoMessage Oblivious Transfer  On Robust Combiners for Oblivious Transfer and Other Primitives  Encryption I  Efficient IdentityBased Encryption Without Random Oracles  TagKEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of KurosawaDesmedt KEM  Signatures and Authentication  Secure Remote Authentication Using Biometric Data  Stronger Security Bounds for WegmanCarterShoup Authenticators  3Move Undeniable Signature Scheme  Group Signatures with Efficient Concurrent Join  Algebra and Number Theory I  FloatingPoint LLL Revisited  Practical Cryptography in High Dimensional Tori  A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers  Quantum Cryptography  Computational Indistinguishability Between Quantum States and Its Cryptographic Application  Approximate Quantum ErrorCorrecting Codes and Secret Sharing Schemes  Secure Protocols  Compact ECash  Cryptographic Asynchronous Multiparty Computation with Optimal Resilience  Algebra and Number Theory II  Differential Cryptanalysis for Multivariate Schemes  A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem  Partial Key Exposure Attacks on RSA up to Full Size Exponents  The RSA Group is PseudoFree  Theory II  Universally Composable PasswordBased Key Exchange  Mercurial Commitments with Applications to ZeroKnowledge Sets  Encryption II  Hierarchical Identity Based Encryption with Constant Size Ciphertext  Fuzzy IdentityBased Encryption  Cryptanalysis II  Second Preimages on nBit Hash Functions for Much Less than 2 n Work  Predicting and Distinguishing Attacks on RC4 Keystream Generator  RelatedKey Boomerang and Rectangle Attacks  On the Impossibility of HighlyEfficient BlockcipherBased Hash Functions  Broadcast Encryption and Traitor Tracing  Public Traceability in Traitor Tracing Schemes  OneWay Chain Based Broadcast Encryption Schemes
 Dimensions
 unknown
 Edition
 1st ed. 2005.
 Extent
 1 online resource (XIV, 578 p.)
 File format
 multiple file formats
 Form of item
 online
 Isbn
 9783540259107
 Level of compression
 uncompressed
 Media category
 computer
 Media type code
 c
 Other control number
 10.1007/b136415
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number

 (CKB)1000000000212975
 (SSID)ssj0000315808
 (PQKBManifestationID)11232653
 (PQKBTitleCode)TC0000315808
 (PQKBWorkID)10263587
 (PQKB)10938986
 (DEHe213)9783540320555
 (MiAaPQ)EBC3067803
 (EXLCZ)991000000000212975
 Label
 Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)
 Note
 Bibliographic Level Mode of Issuance: Monograph
 Antecedent source
 mixed
 Bibliography note
 Includes bibliographical references and index
 Carrier category
 online resource
 Carrier category code
 cr
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Contents
 Cryptanalysis I  Cryptanalysis of the Hash Functions MD4 and RIPEMD  How to Break MD5 and Other Hash Functions  Collisions of SHA0 and Reduced SHA1  Theory I  Reducing Complexity Assumptions for StatisticallyHiding Commitment  Smooth Projective Hashing and TwoMessage Oblivious Transfer  On Robust Combiners for Oblivious Transfer and Other Primitives  Encryption I  Efficient IdentityBased Encryption Without Random Oracles  TagKEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of KurosawaDesmedt KEM  Signatures and Authentication  Secure Remote Authentication Using Biometric Data  Stronger Security Bounds for WegmanCarterShoup Authenticators  3Move Undeniable Signature Scheme  Group Signatures with Efficient Concurrent Join  Algebra and Number Theory I  FloatingPoint LLL Revisited  Practical Cryptography in High Dimensional Tori  A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers  Quantum Cryptography  Computational Indistinguishability Between Quantum States and Its Cryptographic Application  Approximate Quantum ErrorCorrecting Codes and Secret Sharing Schemes  Secure Protocols  Compact ECash  Cryptographic Asynchronous Multiparty Computation with Optimal Resilience  Algebra and Number Theory II  Differential Cryptanalysis for Multivariate Schemes  A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem  Partial Key Exposure Attacks on RSA up to Full Size Exponents  The RSA Group is PseudoFree  Theory II  Universally Composable PasswordBased Key Exchange  Mercurial Commitments with Applications to ZeroKnowledge Sets  Encryption II  Hierarchical Identity Based Encryption with Constant Size Ciphertext  Fuzzy IdentityBased Encryption  Cryptanalysis II  Second Preimages on nBit Hash Functions for Much Less than 2 n Work  Predicting and Distinguishing Attacks on RC4 Keystream Generator  RelatedKey Boomerang and Rectangle Attacks  On the Impossibility of HighlyEfficient BlockcipherBased Hash Functions  Broadcast Encryption and Traitor Tracing  Public Traceability in Traitor Tracing Schemes  OneWay Chain Based Broadcast Encryption Schemes
 Dimensions
 unknown
 Edition
 1st ed. 2005.
 Extent
 1 online resource (XIV, 578 p.)
 File format
 multiple file formats
 Form of item
 online
 Isbn
 9783540259107
 Level of compression
 uncompressed
 Media category
 computer
 Media type code
 c
 Other control number
 10.1007/b136415
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number

 (CKB)1000000000212975
 (SSID)ssj0000315808
 (PQKBManifestationID)11232653
 (PQKBTitleCode)TC0000315808
 (PQKBWorkID)10263587
 (PQKB)10938986
 (DEHe213)9783540320555
 (MiAaPQ)EBC3067803
 (EXLCZ)991000000000212975
Subject
 Algorithm Analysis and Problem Complexity
 Coding and Information Theory
 Coding theory
 Computational complexity
 Computer Communication Networks
 Computer Communication Networks
 Computer software
 Cryptology
 Data encryption (Computer science)
 Discrete Mathematics in Computer Science
 Operating Systems
 Operating systems (Computers)
Member of
Library Locations

Architecture LibraryBorrow itGould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US35.205706 97.445050



Chinese Literature Translation ArchiveBorrow it401 W. Brooks St., RM 414, Norman, OK, 73019, US35.207487 97.447906

Engineering LibraryBorrow itFelgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US35.205706 97.445050

Fine Arts LibraryBorrow itCatlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US35.210371 97.448244

Harry W. Bass Business History CollectionBorrow it401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US35.207487 97.447906

History of Science CollectionsBorrow it401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US35.207487 97.447906

John and Mary Nichols Rare Books and Special CollectionsBorrow it401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US35.207487 97.447906


Price College Digital LibraryBorrow itAdams Hall 102 307 West Brooks St., Norman, OK, 73019, US35.210371 97.448244

Western History CollectionsBorrow itMonnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US35.209584 97.445414
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%93EUROCRYPT200524th/r003IU1ojJc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%93EUROCRYPT200524th/r003IU1ojJc/">Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%93EUROCRYPT200524th/r003IU1ojJc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%93EUROCRYPT200524th/r003IU1ojJc/">Advances in Cryptology – EUROCRYPT 2005 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 2226, 2005, Proceedings, edited by Ronald Cramer, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>