IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of ASIACRYPT 2004

Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings , Springer
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds., Taizo Shirai, Bart Preneel, pp. 1-15
 PDF  postscript BibTeX
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC., Phillip Rogaway, pp. 16-31
 PDF  postscript BibTeX
Eliminating Random Permutation Oracles in the Even-Mansour Cipher., Craig Gentry, Zulfikar Ramzan, pp. 32-47
 PDF  postscript BibTeX
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles., Mihir Bellare, Adriana Palacio, pp. 48-62
 PDF  postscript BibTeX
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding., Duong Hieu Phan, David Pointcheval, pp. 63-77
 PDF  postscript BibTeX
Stream Ciphers: Dead or Alive?, Adi Shamir, pp. 78
 BibTeX
On the Generalized Linear Equivalence of Functions Over Finite Fields., Luca Breveglieri, Alessandra Cherubini, Marco Macchetti, pp. 79-91
 PDF  postscript BibTeX
Sieving Using Bucket Sort., Kazumaro Aoki, Hiroki Ueda, pp. 92-102
 PDF  postscript BibTeX
Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups., Eonkyung Lee, pp. 103-118
 PDF  postscript BibTeX
Practical Two-Party Computation Based on the Conditional Gate., Berry Schoenmakers, Pim Tuyls, pp. 119-136
 PDF  postscript BibTeX
Privacy in Non-private Environments., Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey, pp. 137-151
 PDF  postscript BibTeX
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)., Bartosz Przydatek, Reto Strobl, pp. 152-169
 PDF  postscript BibTeX
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes., Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk, pp. 170-186
 PDF  postscript BibTeX
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions., Palash Sarkar, pp. 187-200
 PDF  postscript BibTeX
Higher Order Universal One-Way Hash Functions., Deukjo Hong, Bart Preneel, Sangjin Lee, pp. 201-213
 PDF  postscript BibTeX
The MD2 Hash Function Is Not One-Way., Frédéric Muller, pp. 214-229
 PDF  postscript BibTeX
New Approaches to Password Authenticated Key Exchange Based on RSA., Muxiang Zhang, pp. 230-244
 PDF  postscript BibTeX
Constant-Round Authenticated Group Key Exchange for Dynamic Groups., Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee, pp. 245-259
 PDF  postscript BibTeX
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates., Tatsuyuki Matsushita, Hideki Imai, pp. 260-275
 PDF  postscript BibTeX
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices., Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis, pp. 276-292
 PDF  postscript BibTeX
Secret Handshakes from CA-Oblivious Encryption., Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik, pp. 293-307
 PDF  postscript BibTeX
k-Times Anonymous Authentication (Extended Abstract)., Isamu Teranishi, Jun Furukawa, Kazue Sako, pp. 308-322
 PDF  postscript BibTeX
The XL-Algorithm and a Conjecture from Commutative Algebra., Claus Diem, pp. 323-337
 PDF  postscript BibTeX
Comparison Between XL and Gröbner Basis Algorithms., Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita, pp. 338-353
 BibTeX
Generic Homomorphic Undeniable Signatures., Jean Monnerat, Serge Vaudenay, pp. 354-371
 PDF  postscript BibTeX
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings., Lan Nguyen, Reihaneh Safavi-Naini, pp. 372-386
 PDF  postscript BibTeX
On the Security of MOR Public Key Cryptosystem., In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek, pp. 387-400
 PDF  postscript BibTeX
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice., Aggelos Kiayias, Moti Yung, pp. 401-416
 PDF  postscript BibTeX
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes., Feng Bao, pp. 417-429
 PDF  postscript BibTeX
Information Security in Korea IT839 Strategy., Ho-Ick Suk, pp. 430-431
 PDF  postscript BibTeX
How Far Can We Go Beyond Linear Cryptanalysis?, Thomas Baignères, Pascal Junod, Serge Vaudenay, pp. 432-450
 PDF  postscript BibTeX
The Davies-Murphy Power Attack., Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette, pp. 451-467
 PDF  postscript BibTeX
Time-Memory Trade-Off Attacks on Multiplications and T-Functions., Joydip Mitra, Palash Sarkar, pp. 468-482
 PDF  postscript BibTeX
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0., Yi Lu 0002, Serge Vaudenay, pp. 483-499
 PDF  postscript BibTeX
On Provably Secure Time-Stamping Schemes., Ahto Buldas, Märt Saarepera, pp. 500-514
 PDF  postscript BibTeX
Strong Conditional Oblivious Transfer and Computing on Intervals., Ian F. Blake, Vladimir Kolesnikov, pp. 515-529
 PDF  postscript BibTeX
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge., Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti, pp. 530-544
 PDF  postscript BibTeX

[ IACR home page ] © IACR