Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 2004
Preface and frontmatter
Page
Title
1-19
Efficient Private Matching and Set Intersection
20-39
Positive Results and Techniques for Obfuscation
40-55
Secure Computation of the k th-Ranked Element
56-73
Short Signatures Without Random Oracles
74-90
Sequential Aggregate Signatures from Trapdoor Permutations
91-108
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission
109-125
The Exact Price for Unconditionally Secure Asymmetric Cryptography
126-137
On Generating the Initial Key in the Bounded-Storage Model
138-152
Practical Large-Scale Distributed Key Generation
153-170
Optimal Communication Complexity of Generic Multicast Key Distribution
171-188
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
189-206
Black-Box Composition Does Not Imply Adaptive Security
207-222
Chosen-Ciphertext Security from Identity-Based Encryption
223-238
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
239-256
Construction of Secure Random Curves of Genus 2 over Prime Fields
257-267
Projective Coordinates Leak
268-286
Security Proofs for Identity-Based Identification and Signature Schemes
287-305
Concurrent Signatures
306-322
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
323-341
Public-Key Steganography
342-360
Immunizing Encryption Schemes from Decryption Errors
361-381
Secure Hashed Diffie-Hellman over Non-DDH Groups
382-400
On Simulation-Sound Trapdoor Commitments
401-418
Hash Function Balance and Its Impact on Birthday Attacks
419-438
Multi-party Computation with Hybrid Security
439-455
On the Hardness of Information-Theoretic Multiparty Computation
456-473
Dining Cryptographers Revisited
474-491
Algebraic Attacks and Decomposition of Boolean Functions
492-505
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
506-522
Public Key Encryption with Keyword Search
523-540
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
541-554
Merkle Tree Traversal in Log Space and Time
555-570
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
571-589
Traceable Signatures
590-608
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme
609-626
Anonymous Identification in Ad Hoc Groups