%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.03", %%% date = "14 October 2017", %%% time = "10:23:36 MDT", %%% filename = "lncs2005a.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "http://www.math.utah.edu/~beebe", %%% checksum = "56261 1183 4676 49683", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "BibTeX, bibliography, Lecture Notes in %%% Computer Science", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a bibliography of papers published in %%% Lecture Notes in Computer Science %%% (Springer-Verlag) for 2005. %%% %%% The companion bibliographies lncs2005b.bib, %%% lncs2005c.bib, and lncs2005d.bib cover %%% other volumes for the same year. %%% %%% Bibliography entries below treat the series %%% as a journal, rather than as conference %%% proceedings. %%% %%% The companion bibliography lncs.bib lists %%% just the individual volumes in the series, %%% and the lncs19xy*.bib files list individual %%% papers for year 19xy. The large number of %%% papers in this collection, and limitations %%% in TeX and BibTeX, and in WWW HTTP transfer %%% speeds, necessitate the splitting of the %%% papers bibliographies into yearly files. %%% %%% At version 1.03, the year coverage looked %%% like this: %%% %%% 2005 ( 53) %%% %%% Article: 53 %%% %%% Total entries: 53 %%% %%% This bibliography has been constructed %%% primarily from the publisher Web site. %%% Regrettably, final page numbers are not %%% available at that source. %%% %%% Numerous errors in the sources noted above %%% have been corrected. Spelling has been %%% verified with the UNIX spell and GNU ispell %%% programs using the exception dictionary %%% stored in the companion file with extension %%% .sok. %%% %%% BibTeX citation tags are uniformly chosen as %%% name:year:abbrev, where name is the family %%% name of the first author or editor, year is a %%% 4-digit number, and abbrev is a 3-letter %%% condensation of important title words. %%% Citation labels were automatically generated %%% by software developed for the BibNet Project. %%% %%% In this bibliography, entries are sorted in %%% publication order, with the help of ``bibsort %%% -byvolume''. The bibsort utility is available %%% from ftp.math.utah.edu in /pub/tex/bib. %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{ "\hyphenation{ Ay-ka-nat Giun-chi-glia Lakh-neche Mal-er-ba Mart-el-li Reut-e-nau-er Thiel-sch-er }" # "\ifx \undefined \FEATPOST \def \FEATPOST {{\manfnt FEAT}\-{\manfnt POST}\spacefactor1000 }\fi" # "\ifx \undefined \MF \def \MF{{\manfnt META}\-{\manfnt FONT}\spacefactor1000 }\fi" # "\ifx \undefined \MP \def \MP{{\manfnt META}\-{\manfnt POST}\spacefactor1000 }\fi" # "\ifx \undefined \circled \def \circled #1{(#1)}\fi" # "\ifx \undefined \manfnt \font \manfnt = logo10 \fi" # "\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" # "\ifx \undefined \pdfTeX \def \pdfTeX {pdf\TeX}\fi" # "\ifx \undefined \reg \def \reg {\circled{R}}\fi" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|http://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-LECT-NOTES-COMP-SCI = "Lecture Notes in Computer Science"} %%% ==================================================================== %%% Publisher abbreviations: @String{pub-SV = "Springer-Verlag Inc."} @String{pub-SV:adr = "New York, NY, USA"} %%% ==================================================================== %%% Series abbreviations: @String{ser-LNAI = "Lecture Notes in Artificial Intelligence"} @String{ser-LNCS = "Lecture Notes in Computer Science"} %%% ==================================================================== %%% Bibliography entries: @Article{Wang:2005:ECS, author = "Xiaoyun Wang and Hongbo Yu and Yiqun Lisa Yin", title = "Efficient Collision Search Attacks on {SHA-0}", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "1--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_1", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", abstract = "In this paper, we present new techniques for collision search in the hash function SHA-0. Using the new techniques, we can find collisions of the full 80-step SHA-0 with complexity less than $ 2^{39} $ hash operations.", acknowledgement = ack-nhfb, keywords = "Collision search attacks; Hash functions; SHA-0; SHA-1.", } @Article{Wang:2005:FCF, author = "Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu", title = "Finding Collisions in the Full {SHA-1}", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "17--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_2", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", abstract = "In this paper, we present new collision search attacks on the hash function SHA-1. We show that collisions of SHA-1 can be found with complexity less than $ 2^{69} $ hash operations. This is the first attack on the full 80-step SHA-1 with complexity less than the $ 2^{80} $ theoretical bound.", acknowledgement = ack-nhfb, keywords = "Collision search attacks; Hash functions; SHA-0; SHA-1.", } @Article{Dwork:2005:PPW, author = "Cynthia Dwork and Moni Naor and Hoeteck Wee", title = "Pebbling and Proofs of Work", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "37--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_3", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Pietrzak:2005:CDI, author = "Krzysztof Pietrzak", title = "Composition Does Not Imply Adaptive Security", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "55--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_4", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Granger:2005:DLP, author = "R. Granger and F. Vercauteren", title = "On the Discrete Logarithm Problem on Algebraic Tori", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "66--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_5", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Myasnikov:2005:PAB, author = "Alexei Myasnikov and Vladimir Shpilrain and Alexander Ushakov", title = "A Practical Attack on a Braid Group Based Cryptographic Protocol", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "86--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_6", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Lu:2005:CCA, author = "Yi Lu and Willi Meier and Serge Vaudenay", title = "The Conditional Correlation Attack: {A} Practical Attack on {Bluetooth} Encryption", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "97--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_7", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", abstract = "Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation of the inputs conditioned on a given (short) output pattern of some specific nonlinear function. Based on the conditional correlations, conditional correlation attacks were shown to be successful and efficient against the nonlinear filter generator. In this paper, we further generalize the concept of conditional correlations by assigning it with a different meaning, i.e. the correlation of the output of an arbitrary function conditioned on the unknown (partial) input which is uniformly distributed. Based on this generalized conditional correlation, a general statistical model is studied for dedicated key-recovery distinguishers. It is shown that the generalized conditional correlation is no smaller than the unconditional correlation. Consequently, our distinguisher improves on the traditional one (in the worst case it degrades into the traditional one). In particular, the distinguisher may be successful even if no ordinary correlation exists. As an application, a conditional correlation attack is developed and optimized against Bluetooth two-level E0. The attack is based on a recently detected flaw in the resynchronization of E0, as well as the investigation of conditional correlations in the Finite State Machine (FSM) governing the keystream output of E0. Our best attack finds the original encryption key for two-level E0 using the first 24 bits of $ 2^{23.8} $ frames and with $ 2^{38} $ computations. This is clearly the fastest and only practical known-plaintext attack on Bluetooth encryption compared with all existing attacks. Current experiments confirm our analysis.", acknowledgement = ack-nhfb, keywords = "Bluetooth; Correlation; E0.; Stream Ciphers", } @Article{Pass:2005:UCN, author = "Rafael Pass and abhi shelat", title = "Unconditional Characterizations of Non-interactive Zero-Knowledge", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "118--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_8", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, xxnote = "Yes, second author is lowercase name.", } @Article{Alwen:2005:IFR, author = "Jo{\"e} Alwen and Giuseppe Persiano and Ivan Visconti", title = "Impossibility and Feasibility Results for Zero Knowledge with Public Keys", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "135--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Fischlin:2005:CEN, author = "Marc Fischlin", title = "Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "152--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_10", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Camenisch:2005:FTO, author = "Jan Camenisch and Anna Lysyanskaya", title = "A Formal Treatment of Onion Routing", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "169--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_11", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Peng:2005:SES, author = "Kun Peng and Colin Boyd and Ed Dawson", title = "Simple and Efficient Shuffling with Provable Correctness and {ZK} Privacy", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "188--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_12", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Abdalla:2005:SER, author = "Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone-Lee and Gregory Neven and Pascal Paillier and Haixia Shi", title = "Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous {IBE}, and Extensions", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "205--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_13", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Ostrovsky:2005:PSS, author = "Rafail Ostrovsky and William E. Skeith III", title = "Private Searching on Streaming Data", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "223--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_14", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Kissner:2005:PPS, author = "Lea Kissner and Dawn Song", title = "Privacy-Preserving Set Operations", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "241--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_15", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Boneh:2005:CRB, author = "Dan Boneh and Craig Gentry and Brent Waters", title = "Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "258--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_16", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Hwang:2005:GTS, author = "Jung Yeon Hwang and Dong Hoon Lee and Jongin Lim", title = "Generic Transformation for Scalable Broadcast Encryption Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "276--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_17", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Juels:2005:APD, author = "Ari Juels and Stephen A. Weis", title = "Authenticating Pervasive Devices with Human Protocols", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "293--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_18", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Vaudenay:2005:SCI, author = "Serge Vaudenay", title = "Secure Communications over Insecure Channels Based on Short Authenticated Strings", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "309--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_19", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Cramer:2005:CMS, author = "Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jim{\'e}nez Urroz and Gregor Leander and Jaume Mart{\'\i}-Farr{\'e} and Carles Padr{\'o}", title = "On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "327--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_20", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Cramer:2005:BBS, author = "Ronald Cramer and Serge Fehr and Martijn Stam", title = "Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "344--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_21", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Barak:2005:SCA, author = "Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin", title = "Secure Computation Without Authentication", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "361--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_22", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Damgaard:2005:CRM, author = "Ivan Damg{\aa}rd and Yuval Ishai", title = "Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "378--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_23", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Barkol:2005:SCC, author = "Omer Barkol and Yuval Ishai", title = "Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "395--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_24", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Boldyreva:2005:ARO, author = "Alexandra Boldyreva and Marc Fischlin", title = "Analysis of Random Oracle Instantiation Scenarios for {OAEP} and Other Practical Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "3621", pages = "412--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_25", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 08:32:34 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Coron:2005:MDR, author = "Jean-S{\'e}bastien Coron and Yevgeniy Dodis and C{\'e}cile Malinaud and Prashant Puniya", title = "{Merkle--Damg{\aa}rd} Revisited: How to Construct a Hash Function", journal = j-LECT-NOTES-COMP-SCI, pages = "430--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_26", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 09:26:13 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Dodis:2005:GIF, author = "Yevgeniy Dodis and Roberto Oliveira and Krzysztof Pietrzak", title = "On the Generic Insecurity of the Full Domain Hash", journal = j-LECT-NOTES-COMP-SCI, pages = "449--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_27", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 09:26:13 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Wolf:2005:NML, author = "Stefan Wolf and J{\"u}rg Wullschleger", title = "New Monotones and Lower Bounds in Unconditional Two-Party Computation", journal = j-LECT-NOTES-COMP-SCI, pages = "467--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_28", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 09:26:13 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Holenstein:2005:OWS, author = "Thomas Holenstein and Renato Renner", title = "One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption", journal = j-LECT-NOTES-COMP-SCI, pages = "478--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_29", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 09:26:13 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Damgaard:2005:QCN, author = "Ivan Damg{\aa}rd and Thomas Brochmann Pedersen and Louis Salvail", title = "A Quantum Cipher with Near Optimal Key-Recycling", journal = j-LECT-NOTES-COMP-SCI, pages = "494--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_30", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 09:26:13 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Chevallier-Mames:2005:ECB, author = "Beno{\^\i}t Chevallier-Mames", title = "An Efficient {CDH}-Based Signature Scheme with a Tight Security Reduction", journal = j-LECT-NOTES-COMP-SCI, pages = "511--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_31", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 09:26:13 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Bellare:2005:ISA, author = "Mihir Bellare and Krzysztof Pietrzak and Phillip Rogaway", title = "Improved Security Analyses for {CBC} {MACs}", journal = j-LECT-NOTES-COMP-SCI, pages = "527--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_32", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 09:26:13 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Krawczyk:2005:HHP, author = "Hugo Krawczyk", title = "{HMQV}: {A} High-Performance Secure {Diffie--Hellman} Protocol", journal = j-LECT-NOTES-COMP-SCI, pages = "546--??", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11535218_33", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Apr 3 09:26:13 2006", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", acknowledgement = ack-nhfb, } @Article{Abramov:2005:RLS, author = "S. A. Abramov and M. Bronstein and D. E. Khmelnov", title = "On Regular and Logarithmic Solutions of Ordinary Linear Differential Systems", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "1--12", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_1", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_1.pdf; http://link.springer.com/content/pdf/bfm:978-3-540-32070-8/1.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Basu:2005:CBN, author = "Saugata Basu and Michael Kettner", title = "Computing the {Betti} Numbers of Arrangements in Practice", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "13--31", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_2", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_2.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Belyaeva:2005:MSN, author = "I. N. Belyaeva and N. A. Chekanov and A. A. Gusev and V. A. Rostovtsev and Yu. A. Ukolov and Y. Uwano and S. I. Vinitsky", title = "A {MAPLE} Symbolic-Numeric Program for Solving the {$2$D}-Eigenvalue Problem by a Self-consistent Basis Method", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "32--39", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_3", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib; http://www.math.utah.edu/pub/tex/bib/maple-extract.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_3.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", } @Article{Berghammer:2005:ROB, author = "Rudolf Berghammer and Frank Neumann", title = "{RelView} --- an {OBDD}-Based Computer Algebra System for Relations", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "40--51", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_4", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_4.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Borges-Quintana:2005:UGB, author = "M. Borges-Quintana and M. A. Borges-Trenard and E. Mart{\'\i}nez-Moro", title = "On the Use of {Gr{\"o}bner} Bases for Computing the Structure of Finite {Abelian} Groups", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "52--64", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_5", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_5.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Bruno:2005:NFI, author = "Alexander D. Bruno and Victor F. Edneral", title = "Normal Forms and Integrability of {ODE} Systems", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "65--74", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_6", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_6.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Buse:2005:RBM, author = "Laurent Bus{\'e} and Houssam Khalil and Bernard Mourrain", title = "Resultant-Based Methods for Plane Curves Intersection Problems", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "75--92", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_7", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_7.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Cattani:2005:SCS, author = "Carlo Cattani and Evgenii A. Grebenikov and Alexander N. Prokopenya", title = "Symbolic Calculations in Studying the Stability of Dynamically Symmetric Satellite Motion", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "93--104", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_8", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_8.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Chibisov:2005:GOG, author = "Dmytro Chibisov and Victor Ganzha and Ernst W. Mayr and Evgenii V. Vorozhtsov", title = "Generation of Orthogonal Grids on Curvilinear Trimmed Regions in Constant Time", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "105--114", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_9.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Chibisov:2005:CAN, author = "Dmytro Chibisov and Victor Ganzha and Sergey Pankratov and Christoph Zenger", title = "Computer Algebra in Nanosciences: Modeling Electronic States in Quantum Dots", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "115--124", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_10", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_10.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Chtcherba:2005:CDR, author = "Arthur D. Chtcherba and Deepak Kapur and Manfred Minimair", title = "{Cayley--Dixon} Resultant Matrices of Multi-univariate Composed Polynomials", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "125--137", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_11", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_11.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Eigenwillig:2005:DAP, author = "Arno Eigenwillig and Lutz Kettner and Werner Krandick and Kurt Mehlhorn and Susanne Schmitt {\textellipsis}", title = "A {Descartes} Algorithm for Polynomials with Bit-Stream Coefficients", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "138--149", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_12", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_12.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Emiris:2005:RSB, author = "Ioannis Z. Emiris and Elias P. Tsigaridas", title = "Real Solving of Bivariate Polynomial Systems", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "150--161", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_13", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_13.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Gago-Vargas:2005:NCC, author = "J. Gago-Vargas and M. I. Hartillo-Hermoso and J. M. Ucha-Enr{\'\i}quez", title = "Nouvelle Cuisine for the Computation of the Annihilating Ideal of $ f^s $", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "162--173", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_14", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_14.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Gerdt:2005:JLM, author = "Vladimir P. Gerdt and Yuri A. Blinkov", title = "{Janet}-Like Monomial Division", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "174--183", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_15", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_15.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Gerdt:2005:JLG, author = "Vladimir P. Gerdt and Yuri A. Blinkov", title = "{Janet}-Like {Gr{\"o}bner} Bases", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "184--195", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_16", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_16.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Gomez:2005:CDM, author = "Domingo G{\'o}mez and Jaime Gutierrez and {\'A}lvar Ibeas", title = "Circulant Digraphs and Monomial Ideals", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "196--207", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_17", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_17.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Gonzalez--Diaz:2005:ATA, author = "Rocio Gonzalez--Diaz and Belen Medrano and Pedro Real and Javier S{\'a}nchez--Pel{\'a}ez", title = "Algebraic Topological Analysis of Time-Sequence of Digital Images", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "208--219", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_18", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_18.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Gonzalez--Vega:2005:HSP, author = "Laureano Gonzalez--Vega and Carlo Traverso and Alberto Zanoni", title = "{Hilbert} Stratification and Parametric {Gr{\"o}bner} Bases", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "220--235", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_19", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_19.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", } @Article{Grebenicov:2005:ISP, author = "E. A. Grebenicov and D. Kozak-Skoworodkin and M. Jakubiak", title = "Investigation of the Stability Problem for the Critical Cases of the {Newtonian} Many-Body Problem", journal = j-LECT-NOTES-COMP-SCI, volume = "3718", pages = "236--243", year = "2005", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/11555964_20", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Tue Aug 12 10:20:51 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib", URL = "http://link.springer.com/content/pdf/10.1007/11555964_20.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/11555964", book-URL = "http://www.springerlink.com/content/978-3-540-32070-8", fjournal = "Lecture Notes in Computer Science", }