


default search action
EUROCRYPT 2004: Interlaken, Switzerland
- Christian Cachin, Jan Camenisch:
Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. Lecture Notes in Computer Science 3027, Springer 2004, ISBN 3-540-21935-8
Private Computation
- Michael J. Freedman, Kobbi Nissim, Benny Pinkas:
Efficient Private Matching and Set Intersection. 1-19 - Ben Lynn, Manoj Prabhakaran, Amit Sahai:
Positive Results and Techniques for Obfuscation. 20-39 - Gagan Aggarwal, Nina Mishra, Benny Pinkas:
Secure Computation of the k th-Ranked Element. 40-55
Signatures I
- Dan Boneh, Xavier Boyen:
Short Signatures Without Random Oracles. 56-73 - Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. 74-90
Unconditional Security
- Ivan Damgård, Thomas Pedersen, Louis Salvail:
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. 91-108 - Renato Renner, Stefan Wolf
:
The Exact Price for Unconditionally Secure Asymmetric Cryptography. 109-125 - Stefan Dziembowski, Ueli M. Maurer:
On Generating the Initial Key in the Bounded-Storage Model. 126-137
Distributed Cryptography
- John F. Canny, Stephen Sorkin:
Practical Large-Scale Distributed Key Generation. 138-152 - Daniele Micciancio
, Saurabh Panjwani:
Optimal Communication Complexity of Generic Multicast Key Distribution. 153-170
Founadations I
- Mihir Bellare, Alexandra Boldyreva, Adriana Palacio:
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. 171-188 - Steven A. Myers:
Black-Box Composition Does Not Imply Adaptive Security. 189-206
Identity-Based Encryption
- Ran Canetti, Shai Halevi, Jonathan Katz:
Chosen-Ciphertext Security from Identity-Based Encryption. 207-222 - Dan Boneh, Xavier Boyen:
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. 223-238
Elliptic Curves
- Pierrick Gaudry, Éric Schost:
Construction of Secure Random Curves of Genus 2 over Prime Fields. 239-256 - David Naccache, Nigel P. Smart, Jacques Stern:
Projective Coordinates Leak. 257-267
Signatures II
- Mihir Bellare, Chanathip Namprempre, Gregory Neven:
Security Proofs for Identity-Based Identification and Signature Schemes. 268-286 - Liqun Chen
, Caroline Kudla, Kenneth G. Paterson:
Concurrent Signatures. 287-305 - Tal Malkin, Satoshi Obana, Moti Yung:
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. 306-322
Public-Key Cryptography
- Luis von Ahn, Nicholas J. Hopper:
Public-Key Steganography. 323-341 - Cynthia Dwork, Moni Naor, Omer Reingold:
Immunizing Encryption Schemes from Decryption Errors. 342-360 - Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. 361-381
Foundations II
- Philip D. MacKenzie, Ke Yang:
On Simulation-Sound Trapdoor Commitments. 382-400 - Mihir Bellare, Tadayoshi Kohno:
Hash Function Balance and Its Impact on Birthday Attacks. 401-418
Multiparty Computation
- Matthias Fitzi, Thomas Holenstein, Jürg Wullschleger:
Multi-party Computation with Hybrid Security. 419-438 - Yuval Ishai, Eyal Kushilevitz:
On the Hardness of Information-Theoretic Multiparty Computation. 439-455 - Philippe Golle, Ari Juels:
Dining Cryptographers Revisited. 456-473
Cryptanalysis
- Willi Meier, Enes Pasalic, Claude Carlet:
Algebraic Attacks and Decomposition of Boolean Functions. 474-491 - Jean-Sébastien Coron:
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. 492-505
New Applications
- Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano:
Public Key Encryption with Keyword Search. 506-522 - Yevgeniy Dodis, Leonid Reyzin, Adam D. Smith:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. 523-540
Algorithms and Implementations
- Michael Szydlo:
Merkle Tree Traversal in Log Space and Time. 541-554 - Phong Q. Nguyen:
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. 555-570
Anonymity
- Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Traceable Signatures. 571-589 - Stanislaw Jarecki, Vitaly Shmatikov:
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. 590-608 - Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup:
Anonymous Identification in Ad Hoc Groups. 609-626

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.