International Association for Cryptologic Research

Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project

EUROCRYPT 2004: Interlaken, Switzerland


Christian Cachin, Jan Camenisch (Eds.): Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. Lecture Notes in Computer Science 3027 Springer 2004, ISBN 3-540-21935-8 BibTeX

PREFACE by Christian Cachin and Jan Camenisch

Sponsored by the
International Association for Cryptologic Research (IACR)
in cooperation with the
IBM Zurich Research Laboratory, Switzerland

Program and General Chairs
Christian Cachin and Jan Camenisch
IBM Zurich Research Laboratory, Switzerland

Program Committee

Alex Biryukov .....Katholieke Universiteit Leuven, Belgium
John Black .....University of Colorado at Boulder, USA
Christian Cachin .....IBM Zurich Research Laboratory, Switzerland
Jan Camenisch .....IBM Zurich Research Laboratory, Switzerland
Jean-Sébastien Coron .....Gemplus Card International, France
Claude Crépeau .....McGill University, Canada
Ivan Damgård .....Aarhus University, Denmark
Juan Garay .....Bell Labs - Lucent Technologies, USA
Rosario Gennaro .....IBM T.J. Watson Research Center, USA
Alain Hiltgen .....UBS, Switzerland
Thomas Johansson .....Lund University, Sweden
Antoine Joux .....DCSSI Crypto Lab, France
Joe Kilian .....NEC Laboratories America, USA
Arjen Lenstra .....Citibank, USA & TU Eindhoven, The Netherlands
Yehuda Lindell .....IBM T.J. Watson Research Center, USA
Anna Lysyanskaya .....Brown University, USA
Daniele Micciancio .....UC San Diego, USA
Omer Reingold .....Weizmann Institute of Science, Israel
Vincent Rijmen .....Cryptomathic and IAIK, Belgium
Phillip Rogaway .....UC Davis, USA & Chiang Mai University, Thailand
Igor Shparlinski .....Macquarie University, Australia
Edlyn Teske .....University of Waterloo, Canada
Rebecca Wright .....Stevens Institute of Technology, USA

External Reviewers


TABLE OF CONTENTS

Private Computation

Signatures I

Unconditional Security

Distributed Cryptography

Foundations I

Identity-Based Encryption

Elliptic Curves

Signatures II

Public-Key Cryptography

Foundations II

Multiparty Computation

Cryptanalysis

New Applications

Algorithms and Implementations

Anonymity


AUTHOR INDEX