{"entities":{"Q1769769":{"pageid":1780511,"ns":120,"title":"Item:Q1769769","lastrevid":43316673,"modified":"2025-07-24T16:05:50Z","type":"item","id":"Q1769769","labels":{"en":{"language":"en","value":"Advances in cryptology -- CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15--19, 2004. Proceedings."}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 2148968"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1769769$46EBCAD0-3D84-4D70-93D2-71201CC0D11D","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"55713719699edfc58dc3a8e665af04129196bfaf","datavalue":{"value":{"text":"Advances in cryptology -- CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15--19, 2004. Proceedings.","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1769769$6FCCE54A-C366-4B89-9924-6971AE5DAAB3","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"9f791c07f6015b1b8ac4587fe445d542424e6ae4","datavalue":{"value":"1058.94002","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1769769$03B3B4EF-BBC2-477E-9A1B-F7221DF2C792","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1769769$2CFB786F-D3A9-4589-8D33-CF38061CBAF6","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"ef9bbd95a6dd7ae5b43fa2d065daa6fcf276ac4c","datavalue":{"value":{"time":"+2005-03-23T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1769769$EC5D78FD-BFE5-4969-89EF-0DE6724C7FAF","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"fda63ead543ee48f5020bf50f4ee2a06c941c886","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1027.00041).  Indexed articles:  \\textit{Biryukov, Alex; De Canni\u00e8re, Christophe; Quisquater, Micha\u00ebl}, On multiple linear approximations, 1-22 [Zbl 1104.94018]  \\textit{Courtois, Nicolas T.}, Feistel schemes and bi-linear cryptanalysis (extended abstract), 23-40 [Zbl 1104.94308]  \\textit{Boneh, Dan; Boyen, Xavier; Shacham, Hovav}, Short group signatures, 41-55 [Zbl 1104.94044]  \\textit{Camenisch, Jan; Lysyanskaya, Anna}, Signature schemes and anonymous credentials from bilinear maps, 56-72 [Zbl 1104.94045]  \\textit{Holenstein, Thomas; Maurer, Ueli; Sj\u00f6din, Johan}, Complete classification of bilinear hard-core functions, 73-91 [Zbl 1104.94024]  \\textit{Hsiao, Chun-Yuan; Reyzin, Leonid}, Finding collisions on a public road, or do secure hash functions need secret coins?, 92-105 [Zbl 1104.94025]  \\textit{Patarin, Jacques}, Security of random Feistel schemes with 5 or more rounds, 106-122 [Zbl 1104.94035]  \\textit{Okeya, Katsuyuki; Schmidt-Samoa, Katja; Spahn, Christian; Takagi, Tsuyoshi}, Signed binary representations revisited, 123-139 [Zbl 1104.94034]  \\textit{Scott, Michael; Barreto, Paulo S. L. M.}, Compressed pairings, 140-156 [Zbl 1104.94036]  \\textit{van Dijk, Marten; Woodruff, David}, Asymptotically optimal communication for torus-based cryptography, 157-178 [Zbl 1104.94041]  \\textit{Gentry, Craig}, How to compress Rabin ciphertexts and signatures (and more), 179-200 [Zbl 1104.68045]  \\textit{Cheng, Qi}, On the bounded sum-of-digits discrete logarithm problem in finite fields, 201-212 [Zbl 1104.11056]  \\textit{May, Alexander}, Computing the RSA secret key is deterministic polynomial time equivalent to factoring, 213-219 [Zbl 1104.94030]  \\textit{Gennaro, Rosario}, Multi-trapdoor commitments and their applications to proofs of knowledge secure under concurrent man-in-the-middle attacks, 220-236 [Zbl 1104.94050]  \\textit{Di Crescenzo, Giovanni; Persiano, Giuseppe; Visconti, Ivan}, Constant-round resettable zero knowledge with concurrent soundness in the bare public-key model, 237-253 [Zbl 1104.94048]  \\textit{Damg\u00e5rd, Ivan; Fehr, Serge; Salvail, Louis}, Zero-knowledge proofs and string commitments withstanding quantum attacks, 254-272 [Zbl 1104.94047]  \\textit{Bellare, Mihir; Palacio, Adriana}, The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols, 273-289 [Zbl 1104.94043]  \\textit{Biham, Eli; Chen, Rafi}, Near-collisions of SHA-0, 290-305 [Zbl 1104.94307]  \\textit{Joux, Antoine}, Multicollisions in iterated hash functions. Application to cascaded constructions, 306-316 [Zbl 1104.68043]  \\textit{Abe, Masayuki; Fehr, Serge}, Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography, 317-334 [Zbl 1104.94042]  \\textit{Katz, Jonathan; Ostrovsky, Rafail}, Round-optimal secure two-party computation, 335-354 [Zbl 1104.94027]  \\textit{Landau, Susan}, Security, liberty, and electronic communications, 355-372 [Zbl 1104.94309]  \\textit{Molland, H\u00e5vard; Helleseth, Tor}, An improved correlation attack against irregular clocked and filtered keystream generators, 373-389 [Zbl 1104.94031]  \\textit{Hawkes, Philip; Rose, Gregory G.}, Rewriting variables: The complexity of fast algebraic attacks on stream ciphers, 390-406 [Zbl 1104.94023]  \\textit{Lu, Yi; Vaudenay, Serge}, Faster correlation attack on Bluetooth keystream generator E0, 407-425 [Zbl 1104.94311]  \\textit{Kurosawa, Kaoru; Desmedt, Yvo}, A new paradigm of hybrid encryption scheme, 426-442 [Zbl 1104.94028]  \\textit{Boneh, Dan; Boyen, Xavier}, Secure identity based encryption without random oracles, 443-459 [Zbl 1104.94019]  \\textit{Moran, Tal; Shaltiel, Ronen; Ta-Shma, Amnon}, Non-interactive timestamping in the bounded storage model, 460-476 [Zbl 1104.94051]  \\textit{Catalano, Dario; Pointcheval, David; Pornin, Thomas}, IPAKE: Isomorphisms for password-based authenticated key exchange, 477-493 [Zbl 1104.94046]  \\textit{Dodis, Yevgeniy; Gennaro, Rosario; H\u00e5stad, Johan; Krawczyk, Hugo; Rabin, Tal}, Randomness extraction and key derivation using the CBC, cascade and HMAC modes, 494-510 [Zbl 1104.68470]  \\textit{Goodrich, Michael T.; Sun, Jonathan Z.; Tamassia, Roberto}, Efficient tree-based revocation in groups of low-state devices, 511-527 [Zbl 1104.94021]  \\textit{Dwork, Cynthia; Nissim, Kobbi}, Privacy-preserving datamining on vertically partitioned databases, 528-544 [Zbl 1104.68038]  \\textit{Srinathan, K.; Narayanan, Arvind; Rangan, C. Pandu}, Optimal perfectly secure message transmission, 545-561 [Zbl 1104.94052]  \\textit{Fitzi, Matthias; Wolf, Stefan; Wullschleger, J\u00fcrg}, Pseudo-signatures, broadcast, and multi-party computation from correlated randomness, 562-578 [Zbl 1104.94049]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1769769$EA8DA1F2-0CEF-419A-91B9-A0E75F5FB966","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1769769$CB1F55CC-7367-485A-B24B-965AB6B4DF53","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1769769$250FEA5D-180F-41AE-A814-463CD018BE80","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1769769$F460E5ED-5A67-4C34-93EB-96EAD7965385","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"3228748d3cb48da659214074b8865a99ded60f8a","datavalue":{"value":"2148968","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1769769$A9BE6566-3B84-48FC-A333-97B4512BA951","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1769769$30D3AE83-1A7D-4384-BCD4-127FBC8E243C","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"4c22279ae274afb210801d499a99755fd1d37066","datavalue":{"value":"https://doi.org/10.1007/b99099","type":"string"},"datatype":"url"},"type":"statement","id":"Q1769769$2F5DA09E-BACC-4C29-81AB-684806341A1F","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"11635146062e0855c5bbd81cea77f557e5d11b18","datavalue":{"value":"W2477011922","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1769769$FBA8CF41-4747-4B84-AE2F-6E8D1981D8D4","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"e19f135025121164464c7f9a0a29148cc40f160c","datavalue":{"value":"10.1007/B99099","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1769769$211893D1-E623-43D8-B240-1A6F6F793D2C","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:1769769","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:1769769"}}}}}