{"entities":{"Q873683":{"pageid":875531,"ns":120,"title":"Item:Q873683","lastrevid":42740477,"modified":"2025-07-09T18:01:30Z","type":"item","id":"Q873683","labels":{"en":{"language":"en","value":"Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 -- June 1, 2006. Proceedings."}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 5138903"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q873683$C6E3BBB6-0EEF-4F35-AC36-8AB1D46122A6","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"349d12b5880ccf36f3cd54100ca9caf3baea1a45","datavalue":{"value":{"text":"Advances in cryptology -- EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 -- June 1, 2006. Proceedings.","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q873683$00564AF1-5164-4C1C-8996-6F7349EE6111","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"4680f398bf49ff07892dac59253a15e13fbfb3cc","datavalue":{"value":"1108.94002","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q873683$A5657D80-5C05-48F0-A2E7-FA5F201A02B0","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"9cbc5b08d038c9800dd6d882158e33afcb8d5def","datavalue":{"value":"10.1007/11761679","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q873683$081786F7-44D4-448C-8793-49E2EA2F6E79","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q873683$14BBE3FB-D8D6-4C66-A732-0D6D0EB93851","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"30dcf6ef5a2c85035f3b8b19f8f29d533a7e8536","datavalue":{"value":{"time":"+2007-03-29T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q873683$C49BECF7-1335-41AD-961F-0A35C044F0B0","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"d1d33fb9cb175f5b970290ee6ea00f355ceba0fe","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1107.94001).  Indexed articles:  \\textit{Cheon, Jung Hee}, Security analysis of the strong Diffie-Hellman problem, 1-11 [Zbl 1129.94017]  \\textit{Paterson, Kenneth G.; Yau, Arnold K. L.}, Cryptography in theory and practice: the case of encryption in IPsec, 12-29 [Zbl 1129.94034]  \\textit{Faug\u00e8re, Jean-Charles; Perret, Ludovic}, Polynomial equivalence problems: algorithmic and theoretical aspects, 30-47 [Zbl 1140.94337]  \\textit{Gratzer, Vanessa; Naccache, David}, Alien vs. Quine, the vanishing circuit and other tales from the industry's crypt. (Invited talk), 48-58 [Zbl 1140.94342]  \\textit{Chang, Ee-Chien; Li, Qiming}, Hiding secret points amidst chaff, 59-72 [Zbl 1140.94329]  \\textit{Katz, Jonathan; Shin, Ji Sun}, Parallel and concurrent security of the HB and HB\\({}^{+}\\) protocols, 73-87 [Zbl 1140.94352]  \\textit{Moran, Tal; Naor, Moni}, Polling with physical envelopes: A rigorous analysis of a human-centric protocol, 88-108 [Zbl 1140.94363]  \\textit{Berbain, C\u00f4me; Gilbert, Henri; Patarin, Jacques}, QUAD: A practical stream cipher with provable security, 109-128 [Zbl 1140.94322]  \\textit{Gouget, Aline; Sibert, Herv\u00e9}, How to strengthen pseudo-random generators by using compression, 129-146 [Zbl 1140.94341]  \\textit{Armknecht, Frederik; Carlet, Claude; Gaborit, Philippe; K\u00fcnzli, Simon; Meier, Willi; Ruatta, Olivier}, Efficient computation of algebraic immunity for algebraic and fast algebraic attacks, 147-164 [Zbl 1140.94320]  \\textit{Contini, Scott; Lenstra, Arjen K.; Steinfeld, Ron}, VSH, an efficient and provable collision-resistant hash function, 165-182 [Zbl 1140.94331]  \\textit{Kelsey, John; Kohno, Tadayoshi}, Herding hash functions and the Nostradamus attack, 183-200 [Zbl 1140.94354]  \\textit{Cr\u00e9peau, Claude; Savvides, George}, Optimal reductions between oblivious transfers using interactive hashing, 201-221 [Zbl 1140.94332]  \\textit{Wolf, Stefan; Wullschleger, J\u00fcrg}, Oblivious transfer is symmetric, 222-232 [Zbl 1140.94372]  \\textit{Gama, Nicolas; Howgrave-Graham, Nick; Nguyen, Phong Q.}, Symplectic lattice reduction and NTRU, 233-253 [Zbl 1140.94339]  \\textit{Joux, Antoine; Lercier, Reynald}, The function field sieve in the medium prime case, 254-270 [Zbl 1140.94349]  \\textit{Nguyen, Phong Q.; Regev, Oded}, Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures, 271-288 [Zbl 1140.94365]  \\textit{Dent, Alexander W.}, The Cramer-Shoup encryption scheme is plaintext aware in the standard model, 289-307 [Zbl 1140.94335]  \\textit{Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit; Wagner, David}, Private circuits. II: Keeping secrets in tamperable circuits, 308-327 [Zbl 1140.94347]  \\textit{Pietrzak, Krzysztof}, Composition implies adaptive security in Minicrypt, 328-338 [Zbl 1140.94367]  \\textit{Groth, Jens; Ostrovsky, Rafail; Sahai, Amit}, Perfect non-interactive zero knowledge for NP, 339-358 [Zbl 1129.94025]  \\textit{McCurley, Kevin S.}, Language modeling and encryption on packet switched networks. (Invited talk), 359-372 [Zbl 1140.94362]  \\textit{Rogaway, Phillip; Shrimpton, Thomas}, A provable-security treatment of the key-wrap problem, 373-390 [Zbl 1140.94369]  \\textit{Maurer, Ueli; Oswald, Yvonne Anne; Pietrzak, Krzysztof; Sj\u00f6din, Johan}, Luby-Rackoff ciphers from weak round functions?, 391-408 [Zbl 1140.94360]  \\textit{Bellare, Mihir; Rogaway, Phillip}, The security of triple encryption and a framework for code-based game-playing proofs, 409-426 [Zbl 1140.94321]  \\textit{Boyen, Xavier; Waters, Brent}, Compact group signatures without random oracles, 427-444 [Zbl 1140.94327]  \\textit{Gentry, Craig}, Practical identity-based encryption without random oracles, 445-464 [Zbl 1140.94340]  \\textit{Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent}, Sequential aggregate signatures and multisignatures without random oracles, 465-485 [Zbl 1140.94358]  \\textit{Dwork, Cynthia; Kenthapadi, Krishnaram; McSherry, Frank; Mironov, Ilya; Naor, Moni}, Our data, ourselves: privacy via distributed noise generation, 486-503 [Zbl 1140.94336]  \\textit{Hofheinz, Dennis; M\u00fcller-Quade, J\u00f6rn; Unruh, Dominique}, On the (im-)possibility of extending coin toss, 504-521 [Zbl 1140.94345]  \\textit{Schoenmakers, Berry; Tuyls, Pim}, Efficient binary conversion for Paillier encrypted values, 522-537 [Zbl 1140.94370]  \\textit{Cr\u00e9peau, Claude; Savvides, George; Schaffner, Christian; Wullschleger, J\u00fcrg}, Information-theoretic conditions for two-party secure function evaluation, 538-554 [Zbl 1140.94333]  \\textit{Damg\u00e5rd, Ivan; Dupont, Kasper; Pedersen, Michael \u00d8stergaard}, Unclonable group identification, 555-572 [Zbl 1140.94374]  \\textit{Boneh, Dan; Sahai, Amit; Waters, Brent}, Fully collusion resistant traitor tracing with short ciphertexts and private keys, 573-592 [Zbl 1140.94326]  \\textit{Almansa, Jes\u00fas F.; Damg\u00e5rd, Ivan; Nielsen, Jesper Buus}, Simplified threshold RSA with adaptive and proactive security, 593-611 [Zbl 1140.94319]","type":"string"},"datatype":"string"},"type":"statement","id":"Q873683$B1838B2C-F239-4C92-9A29-707507B28D01","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q873683$B331489D-BFC6-48D4-82B6-84388D60FFB1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q873683$91EB9B09-7C19-4D1B-8E3F-76F2CBEF9869","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q873683$1365E106-A7B2-4855-9372-00F3D0A2A78E","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"71ba762cfc8d6d91cb555932d38c4f27b5fed867","datavalue":{"value":"5138903","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q873683$6BC10C93-6EE3-4D55-9BB0-A411262928D4","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q873683$FE832EE2-1DAA-4902-8FF0-D7B849D56414","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"56d57ce51eba1f4fba2fbff32cbd34e6b89200c9","datavalue":{"value":"https://doi.org/10.1007/11761679","type":"string"},"datatype":"url"},"type":"statement","id":"Q873683$7FF305F4-781E-4594-B95C-1749E196E524","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"ec02aea755cd25cdd9e650393d04cceff247717d","datavalue":{"value":"W4205238976","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q873683$94831F79-6BA7-448E-B8F0-82828FDE5490","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:873683","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:873683"}}}}}