ISBN: 3-540-67907-3
TITLE: Advances in Cryptology - CRYPTO 2000
AUTHOR: Bellare, Mihir (Ed.)
TOC:

XTR and NTRU
The XTR Public Key System 1
Arjen K. Lenstra, Eric R. Verheul
A Chosen-Ciphertext Attack against NTRU 20
liane Jaulmes, Antoine Joux
Privacy for Databases
Privacy Preserving Data Mining 36
Yehuda Lindell, Benny Pinkas
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing 55
Amos Beimel, Yuval Ishai, Tal Malkin
Secure Distributed Computation and Applications
Parallel Reducibility for Information-Theoretically Secure Computation 74
Yevgeniy Dodis, Silvio Micali
Optimistic Fair Secure Computation 93
Christian Cachin, Jan Camenisch
A Cryptographic Solution to a Game Theoretic Problem 112
Yevgeniy Dodis, Shai Halevi, Tal Rabin
Algebraic Cryptosystems
Differential Fault Attacks on Elliptic Curve Cryptosystems 131
Ingrid Biehl, Bernd Meyer, Volker Mller
Quantum Public-Key Cryptosystems 147
Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama
New Public-Key Cryptosystem Using Braid Groups 166
Ki Hyoung Ko, Sang Jin Lee, Jung Hee Cheon, Jae Woo Han, Ju-sung Kang, Choonsik Park
Message Authentication
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm 184
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions 197
John Black, Phillip Rogaway
L-collision Attacks against Randomized MACs 216
Michael Semanko
Digital Signatures
On the Exact Security of Full Domain Hash 229
Jean-Sbastien Coron
Timed Commitments 236
Dan Boneh, Moni Naor
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme 255
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
Provably Secure Partially Blind Signatures 271
Masayuki Abe, Tatsuaki Okamoto
Cryptanalysis
Weaknesses in the SL2(F_{2^n}) Hashing Scheme 287
Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth
Fast Correlation Attacks through Reconstruction of Linear Polynomials 300
Thomas Johansson, Fredrik Jnsson
Traitor Tracing and Broadcast Encryption
Sequential Traitor Tracing 316
Reihaneh Safavi-Naini, Yejing Wang
Long-Lived Broadcast Encryption 333
Juan A. Garay, Jessica Staddon, Avishai Wool
Invited Talk
Taming the Adversary 353
Martn Abadi
Symmetric Encryption
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search 359
Anand Desai
On the Round Security of Symmetric-Key Cryptographic Primitives 376
Zulfikar Ramzan, Leonid Reyzin
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack 394
Anand Desai
To Commit or Not to Commit
Efficient Non-malleable Commitment Schemes 413
Marc Fischlin, Roger Fischlin
Improved Non-committing Encryption Schemes
Based on a General Complexity Assumption 432
Ivan Damgrd, Jesper Buus Nielsen
Protocols
A Note on the Round-Complexity of Concurrent Zero-Knowledge 451
Alon Rosen
An Improved Pseudo-random Generator Based on Discrete Log 469
Rosario Gennaro
Linking Classical and Quantum Key Agreement: Is There "Bound Information"? 482
Nicolas Gisin, Stefan Wolf
Stream Ciphers and Boolean Functions
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers 501
Muxiang Zhang, Agnes Chan
Nonlinearity Bounds and Constructions of Resilient Boolean Functions 515
Palash Sarkar, Subhamoy Maitra
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications 533
Jrgen Bierbrauer, Holger Schellwat
Author Index 545
END
