IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of CRYPTO 2004

Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings , Springer
On Multiple Linear Approximations., Alex Biryukov, Christophe De Cannière, Michaël Quisquater, pp. 1-22
 PDF  postscript BibTeX
Feistel Schemes and Bi-linear Cryptanalysis., Nicolas Courtois, pp. 23-40
 PDF  postscript BibTeX
Short Group Signatures., Dan Boneh, Xavier Boyen, Hovav Shacham, pp. 41-55
 PDF  postscript BibTeX
Signature Schemes and Anonymous Credentials from Bilinear Maps., Jan Camenisch, Anna Lysyanskaya, pp. 56-72
 PDF  postscript BibTeX
Complete Classification of Bilinear Hard-Core Functions., Thomas Holenstein, Ueli M. Maurer, Johan Sjödin, pp. 73-91
 PDF  postscript BibTeX
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?, Chun-Yuan Hsiao, Leonid Reyzin, pp. 92-105
 PDF  postscript BibTeX
Security of Random Feistel Schemes with 5 or More Rounds., Jacques Patarin, pp. 106-122
 PDF  postscript BibTeX
Signed Binary Representations Revisited., Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi, pp. 123-139
 PDF  postscript BibTeX
Compressed Pairings., Michael Scott, Paulo S. L. M. Barreto, pp. 140-156
 PDF  postscript BibTeX
Asymptotically Optimal Communication for Torus-Based Cryptography., Marten van Dijk, David P. Woodruff, pp. 157-178
 PDF  postscript BibTeX
How to Compress Rabin Ciphertexts and Signatures (and More)., Craig Gentry, pp. 179-200
 PDF  postscript BibTeX
On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields., Qi Cheng, pp. 201-212
 PDF  postscript BibTeX
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring., Alexander May, pp. 213-219
 PDF  postscript BibTeX
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks., Rosario Gennaro, pp. 220-236
 PDF  postscript BibTeX
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model., Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti, pp. 237-253
 PDF  postscript BibTeX
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks., Ivan Damgård, Serge Fehr, Louis Salvail, pp. 254-272
 PDF  postscript BibTeX
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols., Mihir Bellare, Adriana Palacio, pp. 273-289
 PDF  postscript BibTeX
Near-Collisions of SHA-0., Eli Biham, Rafi Chen, pp. 290-305
 PDF  postscript BibTeX
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions., Antoine Joux, pp. 306-316
 PDF  postscript BibTeX
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography., Masayuki Abe, Serge Fehr, pp. 317-334
 PDF  postscript BibTeX
Round-Optimal Secure Two-Party Computation., Jonathan Katz, Rafail Ostrovsky, pp. 335-354
 PDF  postscript BibTeX
Security, Liberty, and Electronic Communications., Susan Landau, pp. 355-372
 PDF  postscript BibTeX
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators., Håvard Molland, Tor Helleseth, pp. 373-389
 PDF  postscript BibTeX
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers., Philip Hawkes, Gregory G. Rose, pp. 390-406
 PDF  postscript BibTeX
Faster Correlation Attack on Bluetooth Keystream Generator E0., Yi Lu 0002, Serge Vaudenay, pp. 407-425
 PDF  postscript BibTeX
A New Paradigm of Hybrid Encryption Scheme., Kaoru Kurosawa, Yvo Desmedt, pp. 426-442
 PDF  postscript BibTeX
Secure Identity Based Encryption Without Random Oracles., Dan Boneh, Xavier Boyen, pp. 443-459
 PDF  postscript BibTeX
Non-interactive Timestamping in the Bounded Storage Model., Tal Moran, Ronen Shaltiel, Amnon Ta-Shma, pp. 460-476
 PDF  postscript BibTeX
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange., Dario Catalano, David Pointcheval, Thomas Pornin, pp. 477-493
 PDF  postscript BibTeX
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes., Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin, pp. 494-510
 PDF  postscript BibTeX
Efficient Tree-Based Revocation in Groups of Low-State Devices., Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, pp. 511-527
 PDF  postscript BibTeX
Privacy-Preserving Datamining on Vertically Partitioned Databases., Cynthia Dwork, Kobbi Nissim, pp. 528-544
 PDF  postscript BibTeX
Optimal Perfectly Secure Message Transmission., K. Srinathan, Arvind Narayanan, C. Pandu Rangan, pp. 545-561
 PDF  postscript BibTeX
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness., Matthias Fitzi, Stefan Wolf, Jürg Wullschleger, pp. 562-578
 PDF  postscript BibTeX

[ IACR home page ] © IACR