ISBN: 3-540-67517-5
TITLE: Advances in Cryptology - EUROCRYPT 2000
AUTHOR: Preneel, Bart (Ed.)
TOC:

Factoring and Discrete Logarithm
Factorization of a 512Bit RSA Modulus 1
Stefania Cavallar (CWI, The Netherlands), Bruce Dodson (Lehigh University, USA), Arjen K. Lenstra (Citibank, USA), Walter Lioen (CWI, The Netherlands), Peter L. Montgomery (Microsoft Research, USA and CWI, The Netherlands), Brian Murphy (Computer Sciences Laboratory, Australia), Herman te Riele (CWI, The Netherlands), Karen Aardal (Utrecht University, The Netherlands), Jeff Gilchrist (Entrust Technologies Ltd., Canada), Grard Guillerm (cole Polytechnique, France), Paul Leyland (Microsoft Research Ltd., UK), Jol Marchand (cole Polytechnique/CNRS, France), Franois Morain (cole Polytechnique, France), Alec Muffett (Sun Microsystems Professional Services, UK), Chris and Craig Putnam (USA), Paul Zimmermann (Inria Lorraine and Loria, France)
An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves 19
Pierrick Gaudry (cole Polytechnique, France)
Analysis and Optimization of the TWINKLE Factoring Device 35
Arjen K. Lenstra (Citibank, USA), Adi Shamir (The Weizmann Institute, Israel)
Cryptanalysis I: Digital Signatures
Noisy Polynomial Interpolation and Noisy Chinese Remaindering 53
Daniel Bleichenbacher (Bell Laboratories, USA), Phong Q. Nguyen (cole Normale Suprieure, France)
A Chosen Messages Attack on the ISO/IEC 97961 Signature Scheme 70
Franois Grieu (Innovatron, France)
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1 81
Marc Girault, Jean-Franois Misarsky (France Tlcom - CNET, France)
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme 91
Jean-Sbastien Coron (cole Normale Suprieure, France), David Naccache (Gemplus Card International, France)
Invited Talk
On the Security of 3GPP Networks 102
Michael Walker (Vodafone and Royal Holloway College, University of London, UK)
Private Information Retrieval
One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval 104
Eyal Kushilevitz (IBM T.J. Watson Research Center, USA), Rafail Ostrovsky (Telcordia Technologies Inc., USA)
Single Database Private Information Retrieval Implies Oblivious Transfer 122
Giovanni Di Crescenzo (Telcordia Technologies, Inc., USA), Tal Malkin (Massachusetts Institute of Technology and AT&T Labs Research), Rafail Ostrovsky (Telcordia Technologies, Inc., USA)
Key Management Protocols
Authenticated Key Exchange Secure against Dictionary Attacks 139
Mihir Bellare (University of California at San Diego, USA), David Pointcheval (cole Normale Suprieure, France), Phillip Rogaway (University of California at Davis, USA)
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman 156
Victor Boyko (Massachusetts Institute of Technology, USA), Philip MacKenzie (Bell Laboratories, USA), Sarvar Patel (Bell Laboratories, USA)
Fair Encryption of RSA Keys 172
Guillaume Poupard, Jacques Stern (cole Normale Suprieure, France)
Threshold Cryptography and Digital Signatures
Computing Inverses over a Shared Secret Modulus 190
Dario Catalano (Universit di Catania, Italy), Rosario Gennaro (IBM T.J.Watson Research Center, USA), Shai Halevi (IBM T.J.Watson Research Center, USA)
Practical Threshold Signatures 207
Victor Shoup (IBM Zrich Research Laboratory, Switzerland)
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures 221
Stanis law Jarecki, Anna Lysyanskaya (Massachusetts Institute of Technology, USA)
Confirmer Signature Schemes Secure against Adaptive Adversaries 243
Jan Camenisch (IBM Zrich Research Laboratory, Switzerland), Markus Michels (Entrust Technologies, Switzerland)
Public-Key Encryption
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements 259
Mihir Bellare (University of California at San Diego, USA), Alexandra Boldyreva (University of California at San Diego, USA), Silvio Micali (Massachusetts Institute of Technology, USA)
Using Hash Functions as a Hedge against Chosen Ciphertext Attack 275
Victor Shoup (IBM Zrich Research Laboratory, Switzerland)
Quantum Cryptography
Security Aspects of Practical Quantum Cryptography 289
Gilles Brassard (Universit de Montral, Canada), Norbert Ltkenhaus (Helsinki Institute of Physics, Finland), Tal Mor (University of California at Los Angeles, USA and College of Judea and Samaria, Israel), Barry C. Sanders (Macquarie University, Australia)
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation 300
Paul Dumais (Universit de Montral, Canada), Dominic Mayers (NEC Research Institute, USA), Louis Salvail (BRICS, University of rhus, Denmark)
Multi-party Computation and Information Theory
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme 316
Ronald Cramer (BRICS, Aarhus University, Denmark), Ivan Damgrd (BRICS, Aarhus University, Denmark), Ueli Maurer (ETH Zrich, Switzerland)
Minimal-Latency Secure Function Evaluation 335
Donald Beaver (CertCo Inc., USA)
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free 351
Ueli Maurer, Stefan Wolf (ETH Zrich, Switzerland)
Cryptanalysis II: Public-Key Encryption
New Attacks on PKCS#1 v1.5 Encryption 369
Jean-Sbastien Coron (cole Normale Suprieure and Gemplus Card International, France), Marc Joye (Gemplus Card International, France), David Naccache (Gemplus Card International, France), Pascal Paillier (Gemplus Card International, France)
A NICE Cryptanalysis 382
liane Jaulmes, Antoine Joux (SCSSI, France)
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations 392
Nicolas Courtois (Toulon University and Bull CP8, France), Alexander Klimov (Moscow State University, Russia), Jacques Patarin (Bull CP8, France), Adi Shamir (The Weizmann Institute of Science, Israel)
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R) 408
Eli Biham (Technion, Israel)
Invited Talk
Colossus and the German Lorenz Cipher  Code Breaking in WW II 417
Anthony E Sale (Bletchley Park Trust)
Zero-Knowledge
Efficient Concurrent Zero-Knowledge in the Auxiliary String Model 418
Ivan Damgrd (BRICS, Aarhus University, Denmark)
Efficient Proofs that a Committed Number Lies in an Interval 431
Fabrice Boudot (France Tlcom - CNET, France)
Symmetric Cryptography
A Composition Theorem for Universal One-Way Hash Functions 445
Victor Shoup (IBM Zrich Research Laboratory, Switzerland)
Exposure-Resilient Functions and All-Or-Nothing Transforms 453
Ran Canetti (IBM T.J. Watson Research Center, USA), Yevgeniy Dodis (Massachusetts Institute of Technology, USA), Shai Halevi (IBM T.J. Watson Research Center, USA), Eyal Kushilevitz (IBM T.J. Watson Research Center, USA and Technion, Israel), Amit Sahai (Massachusetts Institute of Technology, USA)
The Sum of PRPs Is a Secure PRF 470
Stefan Lucks (Universitt Mannheim, Germany)
Boolean Functions and Hardware
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties 485
Palash Sarkar, Subhamoy Maitra (Indian Statistical Institute, India)
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions 507
Anne Canteaut (INRIA, France), Claude Carlet (Universit de Caen, France), Pascale Charpin (NRIA, France), Caroline Fontaine (Universit des Sciences et Technologies de Lille, France)
Cox-Rower Architecture for Fast Parallel Montgomery Multiplication 523
Shinichi Kawamura, Masanobu Koike, Fumihiko Sano, Atsushi Shimbo (Toshiba Corporation, Japan)
Voting Schemes
Efficient Receipt-Free Voting Based on Homomorphic Encryption 539
Martin Hirt (ETH Zrich, Switzerland), Kazue Sako (NEC Corporation, Japan)
How to Break a Practical MIX and Design a New One 557
Yvo Desmedt (Florida State University, USA and Royal Holloway, University of London, UK), Kaoru Kurosawa (Tokyo Institute of Technology, Japan)
Cryptanalysis III: Stream Ciphers and Block Ciphers
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 573
Anne Canteaut (INRIA, France), Michal Trabbia (INRIA and cole Polytechnique, France)
Advanced Slide Attacks 589
Alex Biryukov (Technion, Israel), David Wagner (University of California at Berkeley, USA)
Author Index 607
END
