Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings
Preface and frontmatter
Page
Title
1-15
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
16-31
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
32-47
Eliminating Random Permutation Oracles in the Even-Mansour Cipher
48-62
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
63-77
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding
78
Stream Ciphers: Dead or Alive?
79-91
On the Generalized Linear Equivalence of Functions Over Finite Fields
92-102
Sieving Using Bucket Sort
103-118
Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups
119-136
Practical Two-Party Computation Based on the Conditional Gate
137-151
Privacy in Non-private Environments
152-169
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)
170-186
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
187-200
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
201-213
Higher Order Universal One-Way Hash Functions
214-229
The MD2 Hash Function Is Not One-Way
230-244
New Approaches to Password Authenticated Key Exchange Based on RSA
245-259
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
260-275
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
276-292
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
293-307
Secret Handshakes from CA-Oblivious Encryption
308-322
k-Times Anonymous Authentication (Extended Abstract)
323-337
The XL-Algorithm and a Conjecture from Commutative Algebra
338-353
Comparison Between XL and Gröbner Basis Algorithms
354-371
Generic Homomorphic Undeniable Signatures
372-386
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings
387-400
On the Security of MOR Public Key Cryptosystem
401-416
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice
417-429
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
430-431
Information Security in Korea IT839 Strategy
432-450
How Far Can We Go Beyond Linear Cryptanalysis?
451-467
The Davies-Murphy Power Attack
468-482
Time-Memory Trade-Off Attacks on Multiplications and T-Functions
483-499
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
500-514
On Provably Secure Time-Stamping Schemes
515-529
Strong Conditional Oblivious Transfer and Computing on Intervals
530-544
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge