Eurocrypt 2004 - Accepted papers
See the Eurocrypt 2004 web site for more information.
On Generating the Initial Key in the Bounded Storage Model Stefan Dziembowski and Ueli Maurer Finding Small Roots of Bivariate Integer Polynomial Equations Revisited Jean-Sébastien Coron Public-Key Steganography Luis von Ahn and Nicholas J. Hopper Optimal Communication Complexity of Generic Multicast Key Distribution Daniele Micciancio and Saurabh Panjwani The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures Tal Malkin and Satoshi Obana and Moti Yung On the Hardness of Information-Theoretic Multiparty Computation Yuval Ishai and Eyal Kushilevitz Efficient Private Matching and Set Intersection Michael J. Freedman and Kobbi Nissim and Benny Pinkas Dining Cryptographers Revisited Philippe Golle and Ari Juels An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem Mihir Bellare and Alexandra Boldyreva and Adriana Palacio Security Proofs for Identity-Based Identification and Signature Schemes Mihir Bellare and Chanathip Namprempre and Gregory Neven Construction of Secure Random Curves of Genus 2 over Prime Fields Pierrick Gaudry and Éric Schost Hash Function Balance and its Impact on Birthday Attacks Mihir Bellare and Tadayoshi Kohno Short Signatures Without Random Oracles Dan Boneh and Xavier Boyen Projective Coordinates Leak David Naccache and Nigel P. Smart and Jacques Stern Anonymous Identification in Ad-Hoc Groups Yevgeniy Dodis and Aggelos Kiayias and Antonio Nicolosi and Victor Shoup Merkle Tree Traversal in Log Space and Time Michael Szydlo Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data Yevgeniy Dodis and Leonid Reyzin and Adam Smith Sequential Aggregate Signatures from Trapdoor Permutations Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham Secure Hashed Diffie-Hellman over Non-DDH Groups Rosario Gennaro and Hugo Krawczyk and Tal Rabin On Simulation-Sound Trapdoor Commitments Philip MacKenzie and Ke Yang Public-Key Encryption with Keyword Search Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano Concurrent Signatures Liqun Chen and Caroline Kudla and Kenneth G. Paterson Traceable Signatures Aggelos Kiayias and Yiannis Tsiounis and Moti Yung Positive Results and Techniques for Obfuscation Benjamin Lynn and Manoj Prabhakaran and Amit Sahai The Exact Price for Unconditionally Secure Asymmetric Cryptography Renato Renner and Stefan Wolf On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission Ivan Damgaard and Thomas Pedersen and Louis Salvail Multi-Party Computation with Hybrid Security Matthias Fitzi and Thomas Holenstein and Jürg Wullschleger Algebraic Attacks and Decomposition of Boolean Functions Willi Meier and Enes Pasalic and Claude Carlet Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles Dan Boneh and Xavier Boyen Practical Large-scale Distributed Key Generation John Canny and Stephen Sorkin Chosen-Ciphertext Security from Identity-Based Encryption Ran Canetti and Shai Halevi and Jonathan Katz Secure Computation of the k'th-Ranked Element Gagan Aggarwal and Nina Mishra and Benny Pinkas Handcuffing Big Brother: An Abuse-Resilient Transaction Escrow Scheme Stanislaw Jarecki and Vitaly Shmatikov Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 Phong Q. Nguyen Black-Box Composition Does Not Imply Adaptive Security Steven Myers Immunizing Encryption Schemes from Decryption Errors Cynthia Dwork and Moni Naor and Omer Reingold
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR