@Preamble{
"\hyphenation{
Ay-ka-nat
Giun-chi-glia
Lakh-neche
Mal-er-ba
Mart-el-li
Reut-e-nau-er
Thiel-sch-er
}" #
"\ifx \undefined \FEATPOST \def \FEATPOST {{\manfnt FEAT}\-{\manfnt POST}\spacefactor1000 }\fi" #
"\ifx \undefined \MF \def \MF{{\manfnt META}\-{\manfnt FONT}\spacefactor1000 }\fi" #
"\ifx \undefined \MP \def \MP{{\manfnt META}\-{\manfnt POST}\spacefactor1000 }\fi" #
"\ifx \undefined \circled \def \circled #1{(#1)}\fi" #
"\ifx \undefined \manfnt \font \manfnt = logo10 \fi" #
"\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" #
"\ifx \undefined \pdfTeX \def \pdfTeX {pdf\TeX}\fi" #
"\ifx \undefined \reg \def \reg {\circled{R}}\fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-LECT-NOTES-COMP-SCI = "Lecture Notes in Computer Science"}
@String{pub-SV = "Springer-Verlag Inc."}
@String{pub-SV:adr = "New York, NY, USA"}
@String{ser-LNAI = "Lecture Notes in Artificial Intelligence"}
@String{ser-LNCS = "Lecture Notes in Computer Science"}
@Article{Wang:2005:ECS,
author = "Xiaoyun Wang and Hongbo Yu and Yiqun Lisa Yin",
title = "Efficient Collision Search Attacks on {SHA-0}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "1--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_1",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
abstract = "In this paper, we present new techniques for collision
search in the hash function SHA-0. Using the new
techniques, we can find collisions of the full 80-step
SHA-0 with complexity less than $ 2^{39} $ hash
operations.",
acknowledgement = ack-nhfb,
keywords = "Collision search attacks; Hash functions; SHA-0;
SHA-1.",
}
@Article{Wang:2005:FCF,
author = "Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu",
title = "Finding Collisions in the Full {SHA-1}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "17--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_2",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
abstract = "In this paper, we present new collision search attacks
on the hash function SHA-1. We show that collisions of
SHA-1 can be found with complexity less than $ 2^{69} $
hash operations. This is the first attack on the full
80-step SHA-1 with complexity less than the $ 2^{80} $
theoretical bound.",
acknowledgement = ack-nhfb,
keywords = "Collision search attacks; Hash functions; SHA-0;
SHA-1.",
}
@Article{Dwork:2005:PPW,
author = "Cynthia Dwork and Moni Naor and Hoeteck Wee",
title = "Pebbling and Proofs of Work",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "37--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_3",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Pietrzak:2005:CDI,
author = "Krzysztof Pietrzak",
title = "Composition Does Not Imply Adaptive Security",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "55--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_4",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Granger:2005:DLP,
author = "R. Granger and F. Vercauteren",
title = "On the Discrete Logarithm Problem on Algebraic Tori",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "66--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_5",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Myasnikov:2005:PAB,
author = "Alexei Myasnikov and Vladimir Shpilrain and Alexander
Ushakov",
title = "A Practical Attack on a Braid Group Based
Cryptographic Protocol",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "86--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_6",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Lu:2005:CCA,
author = "Yi Lu and Willi Meier and Serge Vaudenay",
title = "The Conditional Correlation Attack: {A} Practical
Attack on {Bluetooth} Encryption",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "97--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_7",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
abstract = "Motivated by the security of the nonlinear filter
generator, the concept of correlation was previously
extended to the conditional correlation, that studied
the linear correlation of the inputs conditioned on a
given (short) output pattern of some specific nonlinear
function. Based on the conditional correlations,
conditional correlation attacks were shown to be
successful and efficient against the nonlinear filter
generator. In this paper, we further generalize the
concept of conditional correlations by assigning it
with a different meaning, i.e. the correlation of the
output of an arbitrary function conditioned on the
unknown (partial) input which is uniformly distributed.
Based on this generalized conditional correlation, a
general statistical model is studied for dedicated
key-recovery distinguishers. It is shown that the
generalized conditional correlation is no smaller than
the unconditional correlation. Consequently, our
distinguisher improves on the traditional one (in the
worst case it degrades into the traditional one). In
particular, the distinguisher may be successful even if
no ordinary correlation exists. As an application, a
conditional correlation attack is developed and
optimized against Bluetooth two-level E0. The attack is
based on a recently detected flaw in the
resynchronization of E0, as well as the investigation
of conditional correlations in the Finite State Machine
(FSM) governing the keystream output of E0. Our best
attack finds the original encryption key for two-level
E0 using the first 24 bits of $ 2^{23.8} $ frames and
with $ 2^{38} $ computations. This is clearly the
fastest and only practical known-plaintext attack on
Bluetooth encryption compared with all existing
attacks. Current experiments confirm our analysis.",
acknowledgement = ack-nhfb,
keywords = "Bluetooth; Correlation; E0.; Stream Ciphers",
}
@Article{Pass:2005:UCN,
author = "Rafael Pass and abhi shelat",
title = "Unconditional Characterizations of Non-interactive
Zero-Knowledge",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "118--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_8",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
xxnote = "Yes, second author is lowercase name.",
}
@Article{Alwen:2005:IFR,
author = "Jo{\"e} Alwen and Giuseppe Persiano and Ivan
Visconti",
title = "Impossibility and Feasibility Results for Zero
Knowledge with Public Keys",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "135--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Fischlin:2005:CEN,
author = "Marc Fischlin",
title = "Communication-Efficient Non-interactive Proofs of
Knowledge with Online Extractors",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "152--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_10",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Camenisch:2005:FTO,
author = "Jan Camenisch and Anna Lysyanskaya",
title = "A Formal Treatment of Onion Routing",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "169--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_11",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Peng:2005:SES,
author = "Kun Peng and Colin Boyd and Ed Dawson",
title = "Simple and Efficient Shuffling with Provable
Correctness and {ZK} Privacy",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "188--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_12",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Abdalla:2005:SER,
author = "Michel Abdalla and Mihir Bellare and Dario Catalano
and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and
John Malone-Lee and Gregory Neven and Pascal Paillier
and Haixia Shi",
title = "Searchable Encryption Revisited: Consistency
Properties, Relation to Anonymous {IBE}, and
Extensions",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "205--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_13",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Ostrovsky:2005:PSS,
author = "Rafail Ostrovsky and William E. Skeith III",
title = "Private Searching on Streaming Data",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "223--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_14",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Kissner:2005:PPS,
author = "Lea Kissner and Dawn Song",
title = "Privacy-Preserving Set Operations",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "241--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_15",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Boneh:2005:CRB,
author = "Dan Boneh and Craig Gentry and Brent Waters",
title = "Collusion Resistant Broadcast Encryption with Short
Ciphertexts and Private Keys",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "258--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_16",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Hwang:2005:GTS,
author = "Jung Yeon Hwang and Dong Hoon Lee and Jongin Lim",
title = "Generic Transformation for Scalable Broadcast
Encryption Schemes",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "276--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_17",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Juels:2005:APD,
author = "Ari Juels and Stephen A. Weis",
title = "Authenticating Pervasive Devices with Human
Protocols",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "293--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_18",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Vaudenay:2005:SCI,
author = "Serge Vaudenay",
title = "Secure Communications over Insecure Channels Based on
Short Authenticated Strings",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "309--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_19",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Cramer:2005:CMS,
author = "Ronald Cramer and Vanesa Daza and Ignacio Gracia and
Jorge Jim{\'e}nez Urroz and Gregor Leander and Jaume
Mart{\'\i}-Farr{\'e} and Carles Padr{\'o}",
title = "On Codes, Matroids and Secure Multi-party Computation
from Linear Secret Sharing Schemes",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "327--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_20",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Cramer:2005:BBS,
author = "Ronald Cramer and Serge Fehr and Martijn Stam",
title = "Black-Box Secret Sharing from Primitive Sets in
Algebraic Number Fields",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "344--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_21",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Barak:2005:SCA,
author = "Boaz Barak and Ran Canetti and Yehuda Lindell and
Rafael Pass and Tal Rabin",
title = "Secure Computation Without Authentication",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "361--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_22",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Damgaard:2005:CRM,
author = "Ivan Damg{\aa}rd and Yuval Ishai",
title = "Constant-Round Multiparty Computation Using a
Black-Box Pseudorandom Generator",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "378--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_23",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Barkol:2005:SCC,
author = "Omer Barkol and Yuval Ishai",
title = "Secure Computation of Constant-Depth Circuits with
Applications to Database Search Problems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "395--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_24",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Boldyreva:2005:ARO,
author = "Alexandra Boldyreva and Marc Fischlin",
title = "Analysis of Random Oracle Instantiation Scenarios for
{OAEP} and Other Practical Schemes",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3621",
pages = "412--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_25",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 08:32:34 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Coron:2005:MDR,
author = "Jean-S{\'e}bastien Coron and Yevgeniy Dodis and
C{\'e}cile Malinaud and Prashant Puniya",
title = "{Merkle--Damg{\aa}rd} Revisited: How to Construct a
Hash Function",
journal = j-LECT-NOTES-COMP-SCI,
pages = "430--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_26",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 09:26:13 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Dodis:2005:GIF,
author = "Yevgeniy Dodis and Roberto Oliveira and Krzysztof
Pietrzak",
title = "On the Generic Insecurity of the Full Domain Hash",
journal = j-LECT-NOTES-COMP-SCI,
pages = "449--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_27",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 09:26:13 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Wolf:2005:NML,
author = "Stefan Wolf and J{\"u}rg Wullschleger",
title = "New Monotones and Lower Bounds in Unconditional
Two-Party Computation",
journal = j-LECT-NOTES-COMP-SCI,
pages = "467--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_28",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 09:26:13 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Holenstein:2005:OWS,
author = "Thomas Holenstein and Renato Renner",
title = "One-Way Secret-Key Agreement and Applications to
Circuit Polarization and Immunization of Public-Key
Encryption",
journal = j-LECT-NOTES-COMP-SCI,
pages = "478--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_29",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 09:26:13 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Damgaard:2005:QCN,
author = "Ivan Damg{\aa}rd and Thomas Brochmann Pedersen and
Louis Salvail",
title = "A Quantum Cipher with Near Optimal Key-Recycling",
journal = j-LECT-NOTES-COMP-SCI,
pages = "494--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_30",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 09:26:13 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Chevallier-Mames:2005:ECB,
author = "Beno{\^\i}t Chevallier-Mames",
title = "An Efficient {CDH}-Based Signature Scheme with a Tight
Security Reduction",
journal = j-LECT-NOTES-COMP-SCI,
pages = "511--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_31",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 09:26:13 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Bellare:2005:ISA,
author = "Mihir Bellare and Krzysztof Pietrzak and Phillip
Rogaway",
title = "Improved Security Analyses for {CBC} {MACs}",
journal = j-LECT-NOTES-COMP-SCI,
pages = "527--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_32",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 09:26:13 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Krawczyk:2005:HHP,
author = "Hugo Krawczyk",
title = "{HMQV}: {A} High-Performance Secure {Diffie--Hellman}
Protocol",
journal = j-LECT-NOTES-COMP-SCI,
pages = "546--??",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11535218_33",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Mon Apr 3 09:26:13 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
acknowledgement = ack-nhfb,
}
@Article{Abramov:2005:RLS,
author = "S. A. Abramov and M. Bronstein and D. E. Khmelnov",
title = "On Regular and Logarithmic Solutions of Ordinary
Linear Differential Systems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "1--12",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_1",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_1.pdf;
http://link.springer.com/content/pdf/bfm:978-3-540-32070-8/1.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Basu:2005:CBN,
author = "Saugata Basu and Michael Kettner",
title = "Computing the {Betti} Numbers of Arrangements in
Practice",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "13--31",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_2",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_2.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Belyaeva:2005:MSN,
author = "I. N. Belyaeva and N. A. Chekanov and A. A. Gusev and
V. A. Rostovtsev and Yu. A. Ukolov and Y. Uwano and S.
I. Vinitsky",
title = "A {MAPLE} Symbolic-Numeric Program for Solving the
{$2$D}-Eigenvalue Problem by a Self-consistent Basis
Method",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "32--39",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_3",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib;
http://www.math.utah.edu/pub/tex/bib/maple-extract.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_3.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
journal-URL = "http://link.springer.com/bookseries/558",
}
@Article{Berghammer:2005:ROB,
author = "Rudolf Berghammer and Frank Neumann",
title = "{RelView} --- an {OBDD}-Based Computer Algebra System
for Relations",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "40--51",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_4",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_4.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Borges-Quintana:2005:UGB,
author = "M. Borges-Quintana and M. A. Borges-Trenard and E.
Mart{\'\i}nez-Moro",
title = "On the Use of {Gr{\"o}bner} Bases for Computing the
Structure of Finite {Abelian} Groups",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "52--64",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_5",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_5.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bruno:2005:NFI,
author = "Alexander D. Bruno and Victor F. Edneral",
title = "Normal Forms and Integrability of {ODE} Systems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "65--74",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_6",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_6.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Buse:2005:RBM,
author = "Laurent Bus{\'e} and Houssam Khalil and Bernard
Mourrain",
title = "Resultant-Based Methods for Plane Curves Intersection
Problems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "75--92",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_7",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_7.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Cattani:2005:SCS,
author = "Carlo Cattani and Evgenii A. Grebenikov and Alexander
N. Prokopenya",
title = "Symbolic Calculations in Studying the Stability of
Dynamically Symmetric Satellite Motion",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "93--104",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_8",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_8.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Chibisov:2005:GOG,
author = "Dmytro Chibisov and Victor Ganzha and Ernst W. Mayr
and Evgenii V. Vorozhtsov",
title = "Generation of Orthogonal Grids on Curvilinear Trimmed
Regions in Constant Time",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "105--114",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_9.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Chibisov:2005:CAN,
author = "Dmytro Chibisov and Victor Ganzha and Sergey Pankratov
and Christoph Zenger",
title = "Computer Algebra in Nanosciences: Modeling Electronic
States in Quantum Dots",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "115--124",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_10",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_10.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Chtcherba:2005:CDR,
author = "Arthur D. Chtcherba and Deepak Kapur and Manfred
Minimair",
title = "{Cayley--Dixon} Resultant Matrices of Multi-univariate
Composed Polynomials",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "125--137",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_11",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_11.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Eigenwillig:2005:DAP,
author = "Arno Eigenwillig and Lutz Kettner and Werner Krandick
and Kurt Mehlhorn and Susanne Schmitt {\textellipsis}",
title = "A {Descartes} Algorithm for Polynomials with
Bit-Stream Coefficients",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "138--149",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_12",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_12.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Emiris:2005:RSB,
author = "Ioannis Z. Emiris and Elias P. Tsigaridas",
title = "Real Solving of Bivariate Polynomial Systems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "150--161",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_13",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_13.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Gago-Vargas:2005:NCC,
author = "J. Gago-Vargas and M. I. Hartillo-Hermoso and J. M.
Ucha-Enr{\'\i}quez",
title = "Nouvelle Cuisine for the Computation of the
Annihilating Ideal of $ f^s $",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "162--173",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_14",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_14.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Gerdt:2005:JLM,
author = "Vladimir P. Gerdt and Yuri A. Blinkov",
title = "{Janet}-Like Monomial Division",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "174--183",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_15",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_15.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Gerdt:2005:JLG,
author = "Vladimir P. Gerdt and Yuri A. Blinkov",
title = "{Janet}-Like {Gr{\"o}bner} Bases",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "184--195",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_16",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_16.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Gomez:2005:CDM,
author = "Domingo G{\'o}mez and Jaime Gutierrez and {\'A}lvar
Ibeas",
title = "Circulant Digraphs and Monomial Ideals",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "196--207",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_17",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_17.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Gonzalez--Diaz:2005:ATA,
author = "Rocio Gonzalez--Diaz and Belen Medrano and Pedro Real
and Javier S{\'a}nchez--Pel{\'a}ez",
title = "Algebraic Topological Analysis of Time-Sequence of
Digital Images",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "208--219",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_18",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_18.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Gonzalez--Vega:2005:HSP,
author = "Laureano Gonzalez--Vega and Carlo Traverso and Alberto
Zanoni",
title = "{Hilbert} Stratification and Parametric {Gr{\"o}bner}
Bases",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "220--235",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_19",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_19.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Grebenicov:2005:ISP,
author = "E. A. Grebenicov and D. Kozak-Skoworodkin and M.
Jakubiak",
title = "Investigation of the Stability Problem for the
Critical Cases of the {Newtonian} Many-Body Problem",
journal = j-LECT-NOTES-COMP-SCI,
volume = "3718",
pages = "236--243",
year = "2005",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/11555964_20",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Aug 12 10:20:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
URL = "http://link.springer.com/content/pdf/10.1007/11555964_20.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/11555964",
book-URL = "http://www.springerlink.com/content/978-3-540-32070-8",
fjournal = "Lecture Notes in Computer Science",
}