Proceedings of EUROCRYPT 2004
Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings
, Springer
- Efficient Private Matching and Set Intersection., Michael J. Freedman, Kobbi Nissim, Benny Pinkas, pp. 1-19
- PDF postscript BibTeX
- Positive Results and Techniques for Obfuscation., Ben Lynn, Manoj Prabhakaran, Amit Sahai, pp. 20-39
- PDF postscript BibTeX
- Secure Computation of the k th-Ranked Element., Gagan Aggarwal, Nina Mishra, Benny Pinkas, pp. 40-55
- PDF postscript BibTeX
- Short Signatures Without Random Oracles., Dan Boneh, Xavier Boyen, pp. 56-73
- PDF postscript BibTeX
- Sequential Aggregate Signatures from Trapdoor Permutations., Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham, pp. 74-90
- PDF postscript BibTeX
- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission., Ivan Damgård, Thomas Pedersen, Louis Salvail, pp. 91-108
- PDF postscript BibTeX
- The Exact Price for Unconditionally Secure Asymmetric Cryptography., Renato Renner, Stefan Wolf, pp. 109-125
- PDF postscript BibTeX
- On Generating the Initial Key in the Bounded-Storage Model., Stefan Dziembowski, Ueli M. Maurer, pp. 126-137
- PDF postscript BibTeX
- Practical Large-Scale Distributed Key Generation., John F. Canny, Stephen Sorkin, pp. 138-152
- PDF postscript BibTeX
- Optimal Communication Complexity of Generic Multicast Key Distribution., Daniele Micciancio, Saurabh Panjwani, pp. 153-170
- PDF postscript BibTeX
- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem., Mihir Bellare, Alexandra Boldyreva, Adriana Palacio, pp. 171-188
- PDF postscript BibTeX
- Black-Box Composition Does Not Imply Adaptive Security., Steven Myers, pp. 189-206
- PDF postscript BibTeX
- Chosen-Ciphertext Security from Identity-Based Encryption., Ran Canetti, Shai Halevi, Jonathan Katz, pp. 207-222
- PDF postscript BibTeX
- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles., Dan Boneh, Xavier Boyen, pp. 223-238
- PDF postscript BibTeX
- Construction of Secure Random Curves of Genus 2 over Prime Fields., Pierrick Gaudry, Éric Schost, pp. 239-256
- PDF postscript BibTeX
- Projective Coordinates Leak., David Naccache, Nigel P. Smart, Jacques Stern, pp. 257-267
- PDF postscript BibTeX
- Security Proofs for Identity-Based Identification and Signature Schemes., Mihir Bellare, Chanathip Namprempre, Gregory Neven, pp. 268-286
- PDF postscript BibTeX
- Concurrent Signatures., Liqun Chen, Caroline Kudla, Kenneth G. Paterson, pp. 287-305
- PDF postscript BibTeX
- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures., Tal Malkin, Satoshi Obana, Moti Yung, pp. 306-322
- PDF postscript BibTeX
- Public-Key Steganography., Luis von Ahn, Nicholas J. Hopper, pp. 323-341
- PDF postscript BibTeX
- Immunizing Encryption Schemes from Decryption Errors., Cynthia Dwork, Moni Naor, Omer Reingold, pp. 342-360
- PDF postscript BibTeX
- Secure Hashed Diffie-Hellman over Non-DDH Groups., Rosario Gennaro, Hugo Krawczyk, Tal Rabin, pp. 361-381
- PDF postscript BibTeX
- On Simulation-Sound Trapdoor Commitments., Philip D. MacKenzie, Ke Yang, pp. 382-400
- PDF postscript BibTeX
- Hash Function Balance and Its Impact on Birthday Attacks., Mihir Bellare, Tadayoshi Kohno, pp. 401-418
- PDF postscript BibTeX
- Multi-party Computation with Hybrid Security., Matthias Fitzi, Thomas Holenstein, Jürg Wullschleger, pp. 419-438
- PDF postscript BibTeX
- On the Hardness of Information-Theoretic Multiparty Computation., Yuval Ishai, Eyal Kushilevitz, pp. 439-455
- PDF postscript BibTeX
- Dining Cryptographers Revisited., Philippe Golle, Ari Juels, pp. 456-473
- PDF postscript BibTeX
- Algebraic Attacks and Decomposition of Boolean Functions., Willi Meier, Enes Pasalic, Claude Carlet, pp. 474-491
- PDF postscript BibTeX
- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited., Jean-Sébastien Coron, pp. 492-505
- PDF postscript BibTeX
- Public Key Encryption with Keyword Search., Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, pp. 506-522
- PDF postscript BibTeX
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data., Yevgeniy Dodis, Leonid Reyzin, Adam Smith, pp. 523-540
- PDF postscript BibTeX
- Merkle Tree Traversal in Log Space and Time., Michael Szydlo, pp. 541-554
- PDF postscript BibTeX
- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3., Phong Q. Nguyen, pp. 555-570
- PDF postscript BibTeX
- Traceable Signatures., Aggelos Kiayias, Yiannis Tsiounis, Moti Yung, pp. 571-589
- PDF postscript BibTeX
- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme., Stanislaw Jarecki, Vitaly Shmatikov, pp. 590-608
- PDF postscript BibTeX
- Anonymous Identification in Ad Hoc Groups., Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup, pp. 609-626
- PDF postscript BibTeX
[ IACR home page ]
© IACR