default search action
24th CRYPTO 2004: Santa Barbara, California, USA
- Matthew K. Franklin:
Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings. Lecture Notes in Computer Science 3152, Springer 2004, ISBN 3-540-22668-0
Linear Cryptanalysis
- Alex Biryukov, Christophe De Cannière, Michaël Quisquater:
On Multiple Linear Approximations. 1-22 - Nicolas T. Courtois:
Feistel Schemes and Bi-linear Cryptanalysis. 23-40
Group Signatures
- Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. 41-55 - Jan Camenisch, Anna Lysyanskaya:
Signature Schemes and Anonymous Credentials from Bilinear Maps. 56-72
Foundations
- Thomas Holenstein, Ueli M. Maurer, Johan Sjödin:
Complete Classification of Bilinear Hard-Core Functions. 73-91 - Chun-Yuan Hsiao, Leonid Reyzin:
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins? 92-105 - Jacques Patarin:
Security of Random Feistel Schemes with 5 or More Rounds. 106-122
Efficient Representations
- Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi:
Signed Binary Representations Revisited. 123-139 - Michael Scott, Paulo S. L. M. Barreto:
Compressed Pairings. 140-156 - Marten van Dijk, David P. Woodruff:
Asymptotically Optimal Communication for Torus-Based Cryptography. 157-178 - Craig Gentry:
How to Compress Rabin Ciphertexts and Signatures (and More). 179-200
Public Key Cryptanalysis
- Qi Cheng:
On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields. 201-212 - Alexander May:
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. 213-219
Zero-Knowledge
- Rosario Gennaro:
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. 220-236 - Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti:
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. 237-253 - Ivan Damgård, Serge Fehr, Louis Salvail:
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. 254-272 - Mihir Bellare, Adriana Palacio:
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. 273-289
Hash Collisions
- Eli Biham, Rafi Chen:
Near-Collisions of SHA-0. 290-305 - Antoine Joux:
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. 306-316
Secure Computation
- Masayuki Abe, Serge Fehr:
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. 317-334 - Jonathan Katz, Rafail Ostrovsky:
Round-Optimal Secure Two-Party Computation. 335-354
Invited Talk
- Susan Landau:
Security, Liberty, and Electronic Communications. 355-372
Stream Cipher Cryptanalysis
- Håvard Molland, Tor Helleseth:
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. 373-389 - Philip Hawkes, Gregory G. Rose:
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers. 390-406 - Yi Lu, Serge Vaudenay:
Faster Correlation Attack on Bluetooth Keystream Generator E0. 407-425
Public Key Encryption
- Kaoru Kurosawa, Yvo Desmedt:
A New Paradigm of Hybrid Encryption Scheme. 426-442 - Dan Boneh, Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles. 443-459
Bounded Storage Model
- Tal Moran, Ronen Shaltiel, Amnon Ta-Shma:
Non-interactive Timestamping in the Bounded Storage Model. 460-476
Key Management
- Dario Catalano, David Pointcheval, Thomas Pornin:
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. 477-493 - Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. 494-510 - Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia:
Efficient Tree-Based Revocation in Groups of Low-State Devices. 511-527
Computationally Unbounded Adversaries
- Cynthia Dwork, Kobbi Nissim:
Privacy-Preserving Datamining on Vertically Partitioned Databases. 528-544 - K. Srinathan, Arvind Narayanan, C. Pandu Rangan:
Optimal Perfectly Secure Message Transmission. 545-561 - Matthias Fitzi, Stefan Wolf, Jürg Wullschleger:
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. 562-578
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.