<p>When Gwen picks up a pretty hitchhiker on the side of a lonely Texas highway, she has little reason to suspect that her entire life is about to change.<p>Annie has just broken out of prison, and she needs more than a ride—she needs Gwen's help to recover the money she stole.<p>With other mo
On the Run
โ Scribed by Durfee, Robert
- Tongue
- English
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
EUROCRYPT 2001, the 20th annual Eurocrypt conference, was sponsored by the IACR, the International Association for Cryptologic Research, see http://www. iacr. org/, this year in cooperation with the Austrian Computer - ciety (OCG). The General Chair, Reinhard Posch, was responsible for local or- nization, and registration was handled by the IACR Secretariat at the University of California, Santa Barbara. In addition to the papers contained in these proceedings, we were pleased that the conference program also included a presentation by the 2001 IACR d- tinguished lecturer, Andrew Odlyzko, on?Economics and Cryptography? and an invited talk by Silvio Micali,?Zero Knowledge Has Come of Age.? Furthermore, there was the rump session for presentations of recent results and other (p- sibly satirical) topics of interest to the crypto community, which Jean-Jacques Quisquater kindly agreed to run. The Program Committee received 155 submissions and selected 33 papers for presentation; one of them was withdrawn by the authors. The review process was therefore a delicate and challenging task for the committee members, and I wish to thank them for all the e?ort they spent on it. Each committee member was responsible for the review of at least 20 submissions, so each paper was carefully evaluated by at least three reviewers, and submissions with a program committee member as a (co- )author by at least six.
โฆ Table of Contents
Elliptic curves --
Memory efficient version of satoh's algorithm / Frederik Vercauteren, Bart Preneel, Joos Vandewalle --
Finding secure curves with the satoh-FGH algorithm and an early-abort strategy / Mireille Fouquet, Pierrick Gaudry, Robert Harley --
How secure are elliptic curves over composite extension fields? / Nigel P. Smart --
Commitments --
Efficient and non-interactive non-malleable commitment / Giovanni Di Crescenzo [and others] --
How to convert the flavor of a quantum bit commitment / Claude Creฬpeau, Freฬdeฬric Leฬgareฬ, Louis Salvail --
Anonymity --
Cryptographic counters and applications to electronic voting / Jonathan Katz, Steven Myers, Rafail Ostrovsky --
Efficient system for non-transferable anonymous credentials with optional anonumity revocation / Jan Camenisch, Anna Lysyanskaya --
Priced oblivious transfer: how to sell digital goods / Bill Aiello, Yuval Ishai, Omer Reingold --
Signatures and hash functions --
Secure three-move blind signature scheme for polynomially many signatures / Masayuki Abe --
Practical threshold RSA signatures without a trusted dealer / Ivan Damgaฬrd, Maciej Koprowski --
Hash functions: from merkle-damgaฬrd to shoup / Ilya Mironov --
XTR and NTRU --
Key recovery and message attacks on NTRU-composite / Craig Gentry --
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems / Eric R. Verheul --
NSS
an NTRU lattice-based signature scheme / Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman --
Assumptions --
Bit security of paillier's encryption scheme and its applications / Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham --
Assumptions related to discrete logarithms: why subrleties make a real difference / Ahmad-Reza Sadeghi, Michael Steiner --
Multiparty protocols --
Adaptive vs. non-adaptive security of multiparty protocols / Ran Canetti [and others] --
Multiparty computation from threshold homomorphic encryption / Ronald Cramer, Ivan Damgaฬrd, Jesper B. Nielsen --
Perfect and adaptive security in exposure-resilient cryptography / Yevgeniy Dodis, Amit Sahai, Adam Smith --
Block ciphers --
Cryptanalysis of reduced-round MISTY / Ulrich Kuฬhn --
Rectangle attack-rectangling the serpent / Eli Biham, Orr Dunkelman, Nathan Keller --
Primitives --
Efficient amplification of the security of weak pseudo-random function genertors / Steven Myers --
Min-round resettable zero-knowledge in the public key model / Silvio Micali, Leonid Reyzin --
Symmetric ciphers --
Structural cryptanalysis of SASAS / Alex Biryukov, Adi Shamir --
Hyper-bent functions / Amr M. Youssef, Guang Gong --
New method for upper bounding the maximum average linear hull probability for SPNs / Liam Keliher, Henk Meijer, Stafford Tawares --
Key exchange and multicast --
Low bounds for multicast message authentication / Dan Boneh, Glenn Durfee, Matt Franklin --
Analysis of key-exchange protocols and their use for building secure channels / Ran Canetti, Hugo Krwaczyk --
Efficient password-authenticated key exchange using human-memorable passwords / Jonathan Katz, Rafail Ostrovsky, Moti Yung --
Authentication and identification --
Identification protocols secure against reset attacks / Mihir Bellare [and others] --
Does encryption with redundancey provide authenticity? / Jee Hea An, Mihir Bellare --
Encryption modes with almost free message integrity / Charanjit S. Jutla.
๐ SIMILAR VOLUMES
<B>"You cannot fail to be inspired by Abdi's story, an authentic tale by someone who clearly cherishes running and life."</B> โ <I>Gary Lough, distance coach and former pro runner</I><BR /><I>Abdi's World</I> is a quirky place where the only American distance athlete to qualify for five Olympics sha
On the Run reads like the political/espionage thrillers that often head our best-seller listsโexcept that this story is real, this one is true. These are the real-life exploits of an agent who single-handedly derailed dozens of covert operations of the CIA in Europe, Africa and South America.