Proceedings of ASIACRYPT 2004
Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings
, Springer
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds., Taizo Shirai, Bart Preneel, pp. 1-15
- PDF postscript BibTeX
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC., Phillip Rogaway, pp. 16-31
- PDF postscript BibTeX
- Eliminating Random Permutation Oracles in the Even-Mansour Cipher., Craig Gentry, Zulfikar Ramzan, pp. 32-47
- PDF postscript BibTeX
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles., Mihir Bellare, Adriana Palacio, pp. 48-62
- PDF postscript BibTeX
- OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding., Duong Hieu Phan, David Pointcheval, pp. 63-77
- PDF postscript BibTeX
- Stream Ciphers: Dead or Alive?, Adi Shamir, pp. 78
- BibTeX
- On the Generalized Linear Equivalence of Functions Over Finite Fields., Luca Breveglieri, Alessandra Cherubini, Marco Macchetti, pp. 79-91
- PDF postscript BibTeX
- Sieving Using Bucket Sort., Kazumaro Aoki, Hiroki Ueda, pp. 92-102
- PDF postscript BibTeX
- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups., Eonkyung Lee, pp. 103-118
- PDF postscript BibTeX
- Practical Two-Party Computation Based on the Conditional Gate., Berry Schoenmakers, Pim Tuyls, pp. 119-136
- PDF postscript BibTeX
- Privacy in Non-private Environments., Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey, pp. 137-151
- PDF postscript BibTeX
- Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)., Bartosz Przydatek, Reto Strobl, pp. 152-169
- PDF postscript BibTeX
- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes., Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk, pp. 170-186
- PDF postscript BibTeX
- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions., Palash Sarkar, pp. 187-200
- PDF postscript BibTeX
- Higher Order Universal One-Way Hash Functions., Deukjo Hong, Bart Preneel, Sangjin Lee, pp. 201-213
- PDF postscript BibTeX
- The MD2 Hash Function Is Not One-Way., Frédéric Muller, pp. 214-229
- PDF postscript BibTeX
- New Approaches to Password Authenticated Key Exchange Based on RSA., Muxiang Zhang, pp. 230-244
- PDF postscript BibTeX
- Constant-Round Authenticated Group Key Exchange for Dynamic Groups., Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee, pp. 245-259
- PDF postscript BibTeX
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates., Tatsuyuki Matsushita, Hideki Imai, pp. 260-275
- PDF postscript BibTeX
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices., Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis, pp. 276-292
- PDF postscript BibTeX
- Secret Handshakes from CA-Oblivious Encryption., Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik, pp. 293-307
- PDF postscript BibTeX
- k-Times Anonymous Authentication (Extended Abstract)., Isamu Teranishi, Jun Furukawa, Kazue Sako, pp. 308-322
- PDF postscript BibTeX
- The XL-Algorithm and a Conjecture from Commutative Algebra., Claus Diem, pp. 323-337
- PDF postscript BibTeX
- Comparison Between XL and Gröbner Basis Algorithms., Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita, pp. 338-353
- BibTeX
- Generic Homomorphic Undeniable Signatures., Jean Monnerat, Serge Vaudenay, pp. 354-371
- PDF postscript BibTeX
- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings., Lan Nguyen, Reihaneh Safavi-Naini, pp. 372-386
- PDF postscript BibTeX
- On the Security of MOR Public Key Cryptosystem., In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek, pp. 387-400
- PDF postscript BibTeX
- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice., Aggelos Kiayias, Moti Yung, pp. 401-416
- PDF postscript BibTeX
- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes., Feng Bao, pp. 417-429
- PDF postscript BibTeX
- Information Security in Korea IT839 Strategy., Ho-Ick Suk, pp. 430-431
- PDF postscript BibTeX
- How Far Can We Go Beyond Linear Cryptanalysis?, Thomas Baignères, Pascal Junod, Serge Vaudenay, pp. 432-450
- PDF postscript BibTeX
- The Davies-Murphy Power Attack., Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette, pp. 451-467
- PDF postscript BibTeX
- Time-Memory Trade-Off Attacks on Multiplications and T-Functions., Joydip Mitra, Palash Sarkar, pp. 468-482
- PDF postscript BibTeX
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0., Yi Lu 0002, Serge Vaudenay, pp. 483-499
- PDF postscript BibTeX
- On Provably Secure Time-Stamping Schemes., Ahto Buldas, Märt Saarepera, pp. 500-514
- PDF postscript BibTeX
- Strong Conditional Oblivious Transfer and Computing on Intervals., Ian F. Blake, Vladimir Kolesnikov, pp. 515-529
- PDF postscript BibTeX
- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge., Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti, pp. 530-544
- PDF postscript BibTeX
[ IACR home page ]
© IACR