


default search action
ASIACRYPT 2004: Jeju Island, Korea
- Pil Joong Lee:

Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings. Lecture Notes in Computer Science 3329, Springer 2004, ISBN 3-540-23975-8
Block Ciphers
- Taizo Shirai, Bart Preneel:

On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. 1-15 - Phillip Rogaway:

Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. 16-31 - Craig Gentry, Zulfikar Ramzan:

Eliminating Random Permutation Oracles in the Even-Mansour Cipher. 32-47
Public Key Encryption
- Mihir Bellare, Adriana Palacio:

Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. 48-62 - Duong Hieu Phan

, David Pointcheval:
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. 63-77
Invited Talk I
- Adi Shamir:

Stream Ciphers: Dead or Alive? 78
Number Theory and Algebra
- Luca Breveglieri

, Alessandra Cherubini, Marco Macchetti:
On the Generalized Linear Equivalence of Functions Over Finite Fields. 79-91 - Kazumaro Aoki, Hiroki Ueda:

Sieving Using Bucket Sort. 92-102 - Eonkyung Lee

:
Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups. 103-118
Secure Computation
- Berry Schoenmakers, Pim Tuyls:

Practical Two-Party Computation Based on the Conditional Gate. 119-136 - Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey:

Privacy in Non-private Environments. 137-151 - Bartosz Przydatek, Reto Strobl:

Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract). 152-169 - Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk

:
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. 170-186
Hash Functions
- Palash Sarkar:

Masking Based Domain Extenders for UOWHFs: Bounds and Constructions. 187-200 - Deukjo Hong, Bart Preneel, Sangjin Lee:

Higher Order Universal One-Way Hash Functions. 201-213 - Frédéric Muller:

The MD2 Hash Function Is Not One-Way. 214-229
Key Management
- Muxiang Zhang:

New Approaches to Password Authenticated Key Exchange Based on RSA. 230-244 - Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee:

Constant-Round Authenticated Group Key Exchange for Dynamic Groups. 245-259 - Tatsuyuki Matsushita, Hideki Imai:

A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. 260-275
Identification
- Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis:

Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. 276-292 - Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:

Secret Handshakes from CA-Oblivious Encryption. 293-307 - Isamu Teranishi, Jun Furukawa, Kazue Sako:

k-Times Anonymous Authentication (Extended Abstract). 308-322
XL-Algorithms
- Claus Diem:

The XL-Algorithm and a Conjecture from Commutative Algebra. 323-337 - Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita:

Comparison Between XL and Gröbner Basis Algorithms. 338-353
Digital Signatures
- Jean Monnerat, Serge Vaudenay:

Generic Homomorphic Undeniable Signatures. 354-371 - Lan Nguyen, Reihaneh Safavi-Naini:

Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. 372-386
Public Key Cryptanalysis
- In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek:

On the Security of MOR Public Key Cryptosystem. 387-400 - Aggelos Kiayias, Moti Yung:

Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. 401-416 - Feng Bao:

Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. 417-429
Invited Talk II
- Ho-Ick Suk:

Information Security in Korea IT839 Strategy. 430-431
Symmetric Key Cryptanalysis
- Thomas Baignères, Pascal Junod

, Serge Vaudenay:
How Far Can We Go Beyond Linear Cryptanalysis? 432-450 - Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette:

The Davies-Murphy Power Attack. 451-467 - Joydip Mitra, Palash Sarkar:

Time-Memory Trade-Off Attacks on Multiplications and T-Functions. 468-482 - Yi Lu, Serge Vaudenay:

Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. 483-499
Protocols
- Ahto Buldas, Märt Saarepera:

On Provably Secure Time-Stamping Schemes. 500-514 - Ian F. Blake, Vladimir Kolesnikov:

Strong Conditional Oblivious Transfer and Computing on Intervals. 515-529 - Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti:

Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. 530-544

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














