Proceedings of CRYPTO 2004
Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings
, Springer
- On Multiple Linear Approximations., Alex Biryukov, Christophe De Cannière, Michaël Quisquater, pp. 1-22
- PDF postscript BibTeX
- Feistel Schemes and Bi-linear Cryptanalysis., Nicolas Courtois, pp. 23-40
- PDF postscript BibTeX
- Short Group Signatures., Dan Boneh, Xavier Boyen, Hovav Shacham, pp. 41-55
- PDF postscript BibTeX
- Signature Schemes and Anonymous Credentials from Bilinear Maps., Jan Camenisch, Anna Lysyanskaya, pp. 56-72
- PDF postscript BibTeX
- Complete Classification of Bilinear Hard-Core Functions., Thomas Holenstein, Ueli M. Maurer, Johan Sjödin, pp. 73-91
- PDF postscript BibTeX
- Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?, Chun-Yuan Hsiao, Leonid Reyzin, pp. 92-105
- PDF postscript BibTeX
- Security of Random Feistel Schemes with 5 or More Rounds., Jacques Patarin, pp. 106-122
- PDF postscript BibTeX
- Signed Binary Representations Revisited., Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi, pp. 123-139
- PDF postscript BibTeX
- Compressed Pairings., Michael Scott, Paulo S. L. M. Barreto, pp. 140-156
- PDF postscript BibTeX
- Asymptotically Optimal Communication for Torus-Based Cryptography., Marten van Dijk, David P. Woodruff, pp. 157-178
- PDF postscript BibTeX
- How to Compress Rabin Ciphertexts and Signatures (and More)., Craig Gentry, pp. 179-200
- PDF postscript BibTeX
- On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields., Qi Cheng, pp. 201-212
- PDF postscript BibTeX
- Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring., Alexander May, pp. 213-219
- PDF postscript BibTeX
- Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks., Rosario Gennaro, pp. 220-236
- PDF postscript BibTeX
- Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model., Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti, pp. 237-253
- PDF postscript BibTeX
- Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks., Ivan Damgård, Serge Fehr, Louis Salvail, pp. 254-272
- PDF postscript BibTeX
- The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols., Mihir Bellare, Adriana Palacio, pp. 273-289
- PDF postscript BibTeX
- Near-Collisions of SHA-0., Eli Biham, Rafi Chen, pp. 290-305
- PDF postscript BibTeX
- Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions., Antoine Joux, pp. 306-316
- PDF postscript BibTeX
- Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography., Masayuki Abe, Serge Fehr, pp. 317-334
- PDF postscript BibTeX
- Round-Optimal Secure Two-Party Computation., Jonathan Katz, Rafail Ostrovsky, pp. 335-354
- PDF postscript BibTeX
- Security, Liberty, and Electronic Communications., Susan Landau, pp. 355-372
- PDF postscript BibTeX
- An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators., Håvard Molland, Tor Helleseth, pp. 373-389
- PDF postscript BibTeX
- Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers., Philip Hawkes, Gregory G. Rose, pp. 390-406
- PDF postscript BibTeX
- Faster Correlation Attack on Bluetooth Keystream Generator E0., Yi Lu 0002, Serge Vaudenay, pp. 407-425
- PDF postscript BibTeX
- A New Paradigm of Hybrid Encryption Scheme., Kaoru Kurosawa, Yvo Desmedt, pp. 426-442
- PDF postscript BibTeX
- Secure Identity Based Encryption Without Random Oracles., Dan Boneh, Xavier Boyen, pp. 443-459
- PDF postscript BibTeX
- Non-interactive Timestamping in the Bounded Storage Model., Tal Moran, Ronen Shaltiel, Amnon Ta-Shma, pp. 460-476
- PDF postscript BibTeX
- IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange., Dario Catalano, David Pointcheval, Thomas Pornin, pp. 477-493
- PDF postscript BibTeX
- Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes., Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin, pp. 494-510
- PDF postscript BibTeX
- Efficient Tree-Based Revocation in Groups of Low-State Devices., Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, pp. 511-527
- PDF postscript BibTeX
- Privacy-Preserving Datamining on Vertically Partitioned Databases., Cynthia Dwork, Kobbi Nissim, pp. 528-544
- PDF postscript BibTeX
- Optimal Perfectly Secure Message Transmission., K. Srinathan, Arvind Narayanan, C. Pandu Rangan, pp. 545-561
- PDF postscript BibTeX
- Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness., Matthias Fitzi, Stefan Wolf, Jürg Wullschleger, pp. 562-578
- PDF postscript BibTeX
[ IACR home page ]
© IACR