ASIACRYPT 2004: Jeju Island, Korea
Pil Joong Lee (Ed.): Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings. Lecture Notes in Computer Science 3329 Springer 2004, ISBN 3-540-23975-8 BibTeX
Preface by Pil Joong Lee
Sponsored by
International Association for Cryptologic Research (IACR)
in cooperation with
Korean Institute of Information Security and Cryptology (KIISC)
International Research center for Information
Security (IRIS) at Information and Communications University (ICU)
financially supported by
Ministry of Information and Communication (MIC) in Korea.
General Chair
Kwangjo Kim, Information & Communications University, Korea
Program Chair
Pil Joong Lee, Pohang University of Science & Technology, Korea
On leave at KT Research Center, Korea
Program Committee
Jee Hea An | ..... | SoftMax, USA |
Michael Backes | ..... | IBM Zurich Research Lab., Switzerland |
Feng Bao | ..... | Institute for Infocomm Research, Singapore |
Colin Boyd | ..... | Queensland University of Tech., Australia |
Liqun Chen | ..... | Hewlett-Packard Labs, UK |
Don Coppersmith | ..... | IBM T.J. Watson Research Center, USA |
Marc Joye | ..... | Gemplus, France |
Jonathan Katz | ..... | University of Maryland, USA |
Yongdae Kim | ..... | University of Minnesota, USA |
Dong Hoon Lee | ..... | Korea University, Korea |
Jaeil Lee | ..... | KISA, Korea |
Arjen K. Lenstra | ..... | Lucent Technologies, USA, |
..... | & TU Eindhoven, The Netherlands | |
Atsuko Miyaji | ..... | JAIST, Japan |
Jesper Buus Nielsen | ..... | ETH Zurich, Switzerland |
Choonsik Park | ..... | NSRI, Korea |
Dingyi Pei | ..... | Chinese Academy of Sciences, China |
Erez Petrank | ..... | Technion, Israel |
David Pointcheval | ..... | CNRS-ENS, Paris, France |
Bart Preneel | ..... | Katholieke Universiteit Leuven, Belgium |
Vincent Rijmen | ..... | Graz University of Technology, Austria |
Bimal Roy | ..... | Indian Statistical Institute, India |
Rei Safavi-Naini | ..... | University of Wollongong, Australia |
Kazue Sako | ..... | NEC Corporation, Japan |
Kouichi Sakurai | ..... | Kyushu University, Japan |
Nigel Smart | ..... | University of Bristol, UK |
Serge Vaudenay | ..... | EPFL, Switzerland |
Sung-Ming Yen | ..... | National Central University, Taiwan |
Yiqun Lisa Yin | ..... | Princeton University, USA |
Moti Yung | ..... | Columbia University, USA |
Yuliang Zheng | ..... | University of North Carolina at Charlotte, USA |
Organizing Committee
Khi-Jung Ahn | ..... | Cheju National University, Korea |
Jae Choon Cha | ..... | ICU, Korea |
Byoungcheon Lee | ..... | Joongbu University, Korea |
Im-Yeong Lee | ..... | Soonchunhyang University, Korea |
Kyung-Hyune Rhee | ..... | Pukyong National University. Korea |
Dae-Hyun Ryu | ..... | Hansei University, Korea |
Block Ciphers
-
Taizo Shirai
,
Bart Preneel
:
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. (.ps) 1-15
BibTeX -
Phillip Rogaway
:
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. (.ps) 16-31
BibTeX -
Craig Gentry
,
Zulfikar Ramzan
:
Eliminating Random Permutation Oracles in the Even-Mansour Cipher. (.ps) 32-47
BibTeX
Public Key Encryption
-
Mihir Bellare
,
Adriana Palacio
:
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. (.ps) 48-62
BibTeX -
Duong Hieu Phan
,
David Pointcheval
:
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. (.ps) 63-77
BibTeX
Invited Talk I
Number Theory and Algebra
-
Luca Breveglieri
,
Alessandra Cherubini
,
Marco Macchetti
:
On the Generalized Linear Equivalence of Functions Over Finite Fields. (.ps) 79-91
BibTeX -
Kazumaro Aoki
,
Hiroki Ueda
:
Sieving Using Bucket Sort. (.ps) 92-102
BibTeX -
Eonkyung Lee
:
Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups. (.ps) 103-118
BibTeX
Secure Computation
-
Berry Schoenmakers
,
Pim Tuyls
:
Practical Two-Party Computation Based on the Conditional Gate. (.ps) 119-136
BibTeX -
Markus Bläser
,
Andreas Jakoby
,
Maciej Liskiewicz
,
Bodo Manthey
:
Privacy in Non-private Environments. (.ps) 137-151
BibTeX -
Bartosz Przydatek
,
Reto Strobl
:
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract). (.ps) 152-169
BibTeX -
Ron Steinfeld
,
Huaxiong Wang
,
Josef Pieprzyk
:
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. (.ps) 170-186
BibTeX
Hash Functions
-
Palash Sarkar
:
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions. (.ps) 187-200
BibTeX -
Deukjo Hong
,
Bart Preneel
,
Sangjin Lee
:
Higher Order Universal One-Way Hash Functions. (.ps) 201-213
BibTeX -
Frédéric Muller
:
The MD2 Hash Function Is Not One-Way. (.ps) 214-229
BibTeX
Key Management
-
Muxiang Zhang
:
New Approaches to Password Authenticated Key Exchange Based on RSA. (.ps) 230-244
BibTeX -
Hyun-Jeong Kim
,
Su-Mi Lee
,
Dong Hoon Lee
:
Constant-Round Authenticated Group Key Exchange for Dynamic Groups. (.ps) 245-259
BibTeX -
Tatsuyuki Matsushita
,
Hideki Imai
:
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. (.ps) 260-275
BibTeX
Identification
-
Rosario Gennaro
,
Darren Leigh
,
Ravi Sundaram
,
William S. Yerazunis
:
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. (.ps) 276-292
BibTeX -
Claude Castelluccia
,
Stanislaw Jarecki
,
Gene Tsudik
:
Secret Handshakes from CA-Oblivious Encryption. (.ps) 293-307
BibTeX -
Isamu Teranishi
,
Jun Furukawa
,
Kazue Sako
:
k-Times Anonymous Authentication (Extended Abstract). (.ps) 308-322
BibTeX
XL-Algorithms
-
Claus Diem
:
The XL-Algorithm and a Conjecture from Commutative Algebra. (.ps) 323-337
BibTeX -
Gwénolé Ars
,
Jean-Charles Faugère
,
Hideki Imai
,
Mitsuru Kawazoe
,
Makoto Sugita
:
Comparison Between XL and Gröbner Basis Algorithms. (.ps) 338-353
BibTeX
Digital Signatures
-
Jean Monnerat
,
Serge Vaudenay
:
Generic Homomorphic Undeniable Signatures. 354-371
BibTeX -
Lan Nguyen
,
Reihaneh Safavi-Naini
:
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. 372-386
BibTeX
Public Key Cryptanalysis
-
In-Sok Lee
,
Woo-Hwan Kim
,
Daesung Kwon
,
Sangil Nahm
,
Nam-Seok Kwak
,
Yoo-Jin Baek
:
On the Security of MOR Public Key Cryptosystem. (.ps) 387-400
BibTeX -
Aggelos Kiayias
,
Moti Yung
:
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. (.ps) 401-416
BibTeX -
Feng Bao
:
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. (.ps) 417-429
BibTeX
Invited Talk II
Symmetric Key Cryptanalysis
-
Thomas Baignères
,
Pascal Junod
,
Serge Vaudenay
:
How Far Can We Go Beyond Linear Cryptanalysis? (.ps) 432-450
BibTeX -
Sébastien Kunz-Jacques
,
Frédéric Muller
,
Frédéric Valette
:
The Davies-Murphy Power Attack. (.ps) 451-467
BibTeX -
Joydip Mitra
,
Palash Sarkar
:
Time-Memory Trade-Off Attacks on Multiplications and T-Functions. (.ps) 468-482
BibTeX -
Yi Lu
,
Serge Vaudenay
:
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. (.ps) 483-499
BibTeX
Protocols
-
Ahto Buldas
,
Märt Saarepera
:
On Provably Secure Time-Stamping Schemes. (.ps) 500-514
BibTeX -
Ian F. Blake
,
Vladimir Kolesnikov
:
Strong Conditional Oblivious Transfer and Computing on Intervals. (.ps) 515-529
BibTeX -
Giovanni Di Crescenzo
,
Giuseppe Persiano
,
Ivan Visconti
:
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. (.ps) 530-544
BibTeX