IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of EUROCRYPT 2004

Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings , Springer
Efficient Private Matching and Set Intersection., Michael J. Freedman, Kobbi Nissim, Benny Pinkas, pp. 1-19
 PDF  postscript BibTeX
Positive Results and Techniques for Obfuscation., Ben Lynn, Manoj Prabhakaran, Amit Sahai, pp. 20-39
 PDF  postscript BibTeX
Secure Computation of the k th-Ranked Element., Gagan Aggarwal, Nina Mishra, Benny Pinkas, pp. 40-55
 PDF  postscript BibTeX
Short Signatures Without Random Oracles., Dan Boneh, Xavier Boyen, pp. 56-73
 PDF  postscript BibTeX
Sequential Aggregate Signatures from Trapdoor Permutations., Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham, pp. 74-90
 PDF  postscript BibTeX
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission., Ivan Damgård, Thomas Pedersen, Louis Salvail, pp. 91-108
 PDF  postscript BibTeX
The Exact Price for Unconditionally Secure Asymmetric Cryptography., Renato Renner, Stefan Wolf, pp. 109-125
 PDF  postscript BibTeX
On Generating the Initial Key in the Bounded-Storage Model., Stefan Dziembowski, Ueli M. Maurer, pp. 126-137
 PDF  postscript BibTeX
Practical Large-Scale Distributed Key Generation., John F. Canny, Stephen Sorkin, pp. 138-152
 PDF  postscript BibTeX
Optimal Communication Complexity of Generic Multicast Key Distribution., Daniele Micciancio, Saurabh Panjwani, pp. 153-170
 PDF  postscript BibTeX
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem., Mihir Bellare, Alexandra Boldyreva, Adriana Palacio, pp. 171-188
 PDF  postscript BibTeX
Black-Box Composition Does Not Imply Adaptive Security., Steven Myers, pp. 189-206
 PDF  postscript BibTeX
Chosen-Ciphertext Security from Identity-Based Encryption., Ran Canetti, Shai Halevi, Jonathan Katz, pp. 207-222
 PDF  postscript BibTeX
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles., Dan Boneh, Xavier Boyen, pp. 223-238
 PDF  postscript BibTeX
Construction of Secure Random Curves of Genus 2 over Prime Fields., Pierrick Gaudry, Éric Schost, pp. 239-256
 PDF  postscript BibTeX
Projective Coordinates Leak., David Naccache, Nigel P. Smart, Jacques Stern, pp. 257-267
 PDF  postscript BibTeX
Security Proofs for Identity-Based Identification and Signature Schemes., Mihir Bellare, Chanathip Namprempre, Gregory Neven, pp. 268-286
 PDF  postscript BibTeX
Concurrent Signatures., Liqun Chen, Caroline Kudla, Kenneth G. Paterson, pp. 287-305
 PDF  postscript BibTeX
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures., Tal Malkin, Satoshi Obana, Moti Yung, pp. 306-322
 PDF  postscript BibTeX
Public-Key Steganography., Luis von Ahn, Nicholas J. Hopper, pp. 323-341
 PDF  postscript BibTeX
Immunizing Encryption Schemes from Decryption Errors., Cynthia Dwork, Moni Naor, Omer Reingold, pp. 342-360
 PDF  postscript BibTeX
Secure Hashed Diffie-Hellman over Non-DDH Groups., Rosario Gennaro, Hugo Krawczyk, Tal Rabin, pp. 361-381
 PDF  postscript BibTeX
On Simulation-Sound Trapdoor Commitments., Philip D. MacKenzie, Ke Yang, pp. 382-400
 PDF  postscript BibTeX
Hash Function Balance and Its Impact on Birthday Attacks., Mihir Bellare, Tadayoshi Kohno, pp. 401-418
 PDF  postscript BibTeX
Multi-party Computation with Hybrid Security., Matthias Fitzi, Thomas Holenstein, Jürg Wullschleger, pp. 419-438
 PDF  postscript BibTeX
On the Hardness of Information-Theoretic Multiparty Computation., Yuval Ishai, Eyal Kushilevitz, pp. 439-455
 PDF  postscript BibTeX
Dining Cryptographers Revisited., Philippe Golle, Ari Juels, pp. 456-473
 PDF  postscript BibTeX
Algebraic Attacks and Decomposition of Boolean Functions., Willi Meier, Enes Pasalic, Claude Carlet, pp. 474-491
 PDF  postscript BibTeX
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited., Jean-Sébastien Coron, pp. 492-505
 PDF  postscript BibTeX
Public Key Encryption with Keyword Search., Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, pp. 506-522
 PDF  postscript BibTeX
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data., Yevgeniy Dodis, Leonid Reyzin, Adam Smith, pp. 523-540
 PDF  postscript BibTeX
Merkle Tree Traversal in Log Space and Time., Michael Szydlo, pp. 541-554
 PDF  postscript BibTeX
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3., Phong Q. Nguyen, pp. 555-570
 PDF  postscript BibTeX
Traceable Signatures., Aggelos Kiayias, Yiannis Tsiounis, Moti Yung, pp. 571-589
 PDF  postscript BibTeX
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme., Stanislaw Jarecki, Vitaly Shmatikov, pp. 590-608
 PDF  postscript BibTeX
Anonymous Identification in Ad Hoc Groups., Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup, pp. 609-626
 PDF  postscript BibTeX

[ IACR home page ] © IACR