IACR Eurocrypt 2004
 
Home
Call for Papers
Accepted Papers
Program
Proceedings
Rump Session
Venue
Excursion
Accommodation
Travel Info
Registration
Sponsors
Contact
 
 
 
 
 

List of Accepted Papers


On Generating the Initial Key in the Bounded Storage Model
Stefan Dziembowski and Ueli Maurer

Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
Jean-Sébastien Coron

Public-Key Steganography
Luis von Ahn and Nicholas J. Hopper

Optimal Communication Complexity of Generic Multicast Key Distribution
Daniele Micciancio and Saurabh Panjwani

The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Tal Malkin and Satoshi Obana and Moti Yung

On the Hardness of Information-Theoretic Multiparty Computation
Yuval Ishai and Eyal Kushilevitz

Efficient Private Matching and Set Intersection
Michael J. Freedman and Kobbi Nissim and Benny Pinkas

Dining Cryptographers Revisited
Philippe Golle and Ari Juels

An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
Mihir Bellare and Alexandra Boldyreva and Adriana Palacio

Security Proofs for Identity-Based Identification and Signature Schemes
Mihir Bellare and Chanathip Namprempre and Gregory Neven

Construction of Secure Random Curves of Genus 2 over Prime Fields
Pierrick Gaudry and Éric Schost

Hash Function Balance and its Impact on Birthday Attacks
Mihir Bellare and Tadayoshi Kohno

Short Signatures Without Random Oracles
Dan Boneh and Xavier Boyen

Projective Coordinates Leak
David Naccache and Nigel P. Smart and Jacques Stern

Anonymous Identification in Ad-Hoc Groups
Yevgeniy Dodis and Aggelos Kiayias and Antonio Nicolosi and Victor Shoup

Merkle Tree Traversal in Log Space and Time
Michael Szydlo

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Leonid Reyzin and Adam Smith

Sequential Aggregate Signatures from Trapdoor Permutations
Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham

Secure Hashed Diffie-Hellman over Non-DDH Groups
Rosario Gennaro and Hugo Krawczyk and Tal Rabin

On Simulation-Sound Trapdoor Commitments
Philip MacKenzie and Ke Yang

Public-Key Encryption with Keyword Search
Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano

Concurrent Signatures
Liqun Chen and Caroline Kudla and Kenneth G. Paterson

Traceable Signatures
Aggelos Kiayias and Yiannis Tsiounis and Moti Yung

Positive Results and Techniques for Obfuscation
Benjamin Lynn and Manoj Prabhakaran and Amit Sahai

The Exact Price for Unconditionally Secure Asymmetric Cryptography
Renato Renner and Stefan Wolf

On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
Ivan Damgaard and Thomas Pedersen and Louis Salvail

Multi-Party Computation with Hybrid Security
Matthias Fitzi and Thomas Holenstein and Jürg Wullschleger

Algebraic Attacks and Decomposition of Boolean Functions
Willi Meier and Enes Pasalic and Claude Carlet

Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
Dan Boneh and Xavier Boyen

Practical Large-scale Distributed Key Generation
John Canny and Stephen Sorkin

Chosen-Ciphertext Security from Identity-Based Encryption
Ran Canetti and Shai Halevi and Jonathan Katz

Secure Computation of the k'th-Ranked Element
Gagan Aggarwal and Nina Mishra and Benny Pinkas

Handcuffing Big Brother: An Abuse-Resilient Transaction Escrow Scheme
Stanislaw Jarecki and Vitaly Shmatikov

Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
Phong Q. Nguyen

Black-Box Composition Does Not Imply Adaptive Security
Steven Myers

Immunizing Encryption Schemes from Decryption Errors
Cynthia Dwork and Moni Naor and Omer Reingold


Organized by members of the IBM Zurich Research Lab