Advances in cryptology -- EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22--26, 2005. Proceedings
From MaRDI portal
Publication:873593
DOI10.1007/B136415zbMath1107.94001OpenAlexW2490262601WikidataQ21898129 ScholiaQ21898129MaRDI QIDQ873593
No author found.
Publication date: 29 March 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b136415
Proceedings of conferences of miscellaneous specific interest (00B25) Cryptography (94A60) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Related Items (13)
Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security ⋮ Extracts from the SHA-3 Competition ⋮ Practical Free-Start Collision Attacks on 76-step SHA-1 ⋮ Generic attacks on hash combiners ⋮ Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks ⋮ How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? ⋮ Attacking Reduced Round SHA-256 ⋮ A quantum multi-proxy blind signature scheme based on D-dimensional GHZ states ⋮ On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak ⋮ MD4 is Not One-Way ⋮ Linear Analysis of Reduced-Round CubeHash ⋮ On the Weak Ideal Compression Functions ⋮ Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
This page was built for publication: Advances in cryptology -- EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22--26, 2005. Proceedings