Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings
Preface and frontmatter
Page
Title
1-22
On Multiple Linear Approximations
23-40
Feistel Schemes and Bi-linear Cryptanalysis
41-55
Short Group Signatures
56-72
Signature Schemes and Anonymous Credentials from Bilinear Maps
73-91
Complete Classification of Bilinear Hard-Core Functions
92-105
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
106-122
Security of Random Feistel Schemes with 5 or More Rounds
123-139
Signed Binary Representations Revisited
140-156
Compressed Pairings
157-178
Asymptotically Optimal Communication for Torus-Based Cryptography
179-200
How to Compress Rabin Ciphertexts and Signatures (and More)
201-212
On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields
213-219
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring
220-236
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks
237-253
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model
254-272
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks
273-289
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
290-305
Near-Collisions of SHA-0
306-316
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
317-334
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
335-354
Round-Optimal Secure Two-Party Computation
355-372
Security, Liberty, and Electronic Communications
373-389
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators
390-406
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers
407-425
Faster Correlation Attack on Bluetooth Keystream Generator E0
426-442
A New Paradigm of Hybrid Encryption Scheme
443-459
Secure Identity Based Encryption Without Random Oracles
460-476
Non-interactive Timestamping in the Bounded Storage Model
477-493
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
494-510
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
511-527
Efficient Tree-Based Revocation in Groups of Low-State Devices
528-544
Privacy-Preserving Datamining on Vertically Partitioned Databases
545-561
Optimal Perfectly Secure Message Transmission
562-578
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness