{"entities":{"Q1888940":{"pageid":1899682,"ns":120,"title":"Item:Q1888940","lastrevid":73711308,"modified":"2026-04-14T17:00:19Z","type":"item","id":"Q1888940","labels":{"en":{"language":"en","value":"Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings."}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 2120276"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1888940$00471922-7BF2-4878-B8C9-F152DA2B7AF4","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"5321ef3a1290107613ab29df1c8be3dc5483ac44","datavalue":{"value":{"text":"Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q1888940$2DA9A5FC-6E98-47A7-A007-8230B8F521B5","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"96df45eefc235b265dff7fdbb3c6087673e3d82d","datavalue":{"value":"1051.94003","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1888940$DFCCCE69-0C7D-4926-A87A-E25A33FB8798","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1888940$68FEFB0D-CFD2-4E46-BDEE-7B121D783C0A","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"e178366185acdafcc5b61ed93923a8827b9be7cb","datavalue":{"value":{"time":"+2004-11-29T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q1888940$0DB7BFA9-8DEA-4F5D-B772-F8523A27137B","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"8a224a49f24693cc2b70b973bee03217ac309026","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1020.00023).  Indexed articles:  \\textit{Freedman, Michael J.; Nissim, Kobbi; Pinkas, Benny}, Efficient private matching and set intersection, 1-19 [Zbl 1122.94416]  \\textit{Lynn, Benjamin; Prabhakaran, Manoj; Sahai, Amit}, Positive results and techniques for obfuscation, 20-39 [Zbl 1122.94434]  \\textit{Aggarwal, Gagan; Mishra, Nina; Pinkas, Benny}, Secure computation of the \\(k\\)th-ranked element, 40-55 [Zbl 1122.68422]  \\textit{Boneh, Dan; Boyen, Xavier}, Short signatures without random oracles, 56-73 [Zbl 1122.94354]  \\textit{Lysyanskaya, Anna; Micali, Silvio; Reyzin, Leonid; Shacham, Hovav}, Sequential aggregate signatures from trapdoor permutations, 74-90 [Zbl 1122.94385]  \\textit{Damg\u00e5rd, Ivan; Pedersen, Thomas; Salvail, Louis}, On the key-uncertainty of quantum ciphers and the computational security of one-way quantum transmission, 91-108 [Zbl 1122.94367]  \\textit{Renner, Renato; Wolf, Stefan}, The exact price for unconditionally secure asymmetric cryptography, 109-125 [Zbl 1122.94398]  \\textit{Dziembowski, Stefan; Maurer, Ueli}, On generating the initial key in the bounded-storage model, 126-137 [Zbl 1122.94370]  \\textit{Canny, John; Sorkin, Stephen}, Practical large-scale distributed key generation, 138-152 [Zbl 1122.94361]  \\textit{Micciancio, Daniele; Panjwani, Saurabh}, Optimal communication complexity of generic multicast key distribution, 153-170 [Zbl 1122.94388]  \\textit{Bellare, Mihir; Boldyreva, Alexandra; Palacio, Adriana}, An uninstantiable random-oracle-Model scheme for a hybrid-encryption problem, 171-188 [Zbl 1122.94350]  \\textit{Myers, Steven}, Black-box composition does not imply adaptive security, 189-206 [Zbl 1122.94390]  \\textit{Canetti, Ran; Halevi, Shai; Katz, Jonathan}, Chosen-ciphertext security from identity-based encryption, 207-222 [Zbl 1122.94358]  \\textit{Boneh, Dan; Boyen, Xavier}, Efficient selective-id secure identity-based encryption without random oracles, 223-238 [Zbl 1122.94355]  \\textit{Gaudry, Pierrick; Schost, \u00c9ric}, Construction of secure random curves of genus 2 over prime fields, 239-256 [Zbl 1122.11315]  \\textit{Naccache, David; Smart, Nigel P.; Stern, Jacques}, Projective coordinates leak, 257-267 [Zbl 1122.14300]  \\textit{Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory}, Security proofs for identity-based identification and signature schemes, 268-286 [Zbl 1120.94309]  \\textit{Chen, Liqun; Kudla, Caroline; Paterson, Kenneth G.}, Concurrent signatures, 287-305 [Zbl 1122.94412]  \\textit{Malkin, Tal; Obana, Satoshi; Yung, Moti}, The hierarchy of Key evolving signatures and a characterization of proxy signatures, 306-322 [Zbl 1122.94436]  \\textit{von Ahn, Luis; Hopper, Nicholas J.}, Public-key steganography, 323-341 [Zbl 1122.94443]  \\textit{Dwork, Cynthia; Naor, Moni; Reingold, Omer}, Immunizing encryption schemes from decryption errors, 342-360 [Zbl 1122.94369]  \\textit{Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal}, Secure hashed Diffie-Hellman over non-DDH groups, 361-381 [Zbl 1122.94418]  \\textit{MacKenzie, Philip; Yang, Ke}, On simulation-sound trapdoor commitments, 382-400 [Zbl 1122.94386]  \\textit{Bellare, Mihir; Kohno, Tadayoshi}, Hash function balance and its impact on birthday attacks, 401-418 [Zbl 1122.94351]  \\textit{Fitzi, Matthias; Holenstein, Thomas; Wullschleger, J\u00fcrg}, Multi-party computation with hybrid security, 419-438 [Zbl 1122.94373]  \\textit{Ishai, Yuval; Kushilevitz, Eyal}, On the hardness of information-theoretic multiparty computation, 439-455 [Zbl 1122.94423]  \\textit{Golle, Philippe; Juels, Ari}, Dining cryptographers revisited, 456-473 [Zbl 1122.94420]  \\textit{Meier, Willi; Pasalic, Enes; Carlet, Claude}, Algebraic attacks and decomposition of Boolean functions, 474-491 [Zbl 1122.94041]  \\textit{Coron, Jean-S\u00e9bastien}, Finding small roots of bivariate integer polynomial equations revisited, 492-505 [Zbl 1122.13302]  \\textit{Boneh, Dan; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe}, Public key encryption with keyword search, 506-522 [Zbl 1122.68424]  \\textit{Dodis, Yevgeniy; Reyzin, Leonid; Smith, Adam}, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, 523-540 [Zbl 1122.94368]  \\textit{Szydlo, Michael}, Merkle tree traversal in log space and time, 541-554 [Zbl 1122.68751]  \\textit{Nguyen, Phong Q.}, Can we trust cryptographic software? Cryptographic flaws in GNU privacy guard v1.2.3, 555-570 [Zbl 1122.94392]  \\textit{Kiayias, Aggelos; Tsiounis, Yiannis; Yung, Moti}, Traceable signatures, 571-589 [Zbl 1122.94427]  \\textit{Jarecki, Stanislaw; Shmatikov, Vitaly}, Handcuffing big brother: an abuse-resilient transaction escrow scheme, 590-608 [Zbl 1122.94425]  \\textit{Dodis, Yevgeniy; Kiayias, Aggelos; Nicolosi, Antonio; Shoup, Victor}, Anonymous identification in ad hoc groups, 609-626 [Zbl 1122.94414]","type":"string"},"datatype":"string"},"type":"statement","id":"Q1888940$95FF44A2-D839-494E-AF1A-9D7A7A14B73B","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1888940$A2D64328-31BC-4FE5-863D-8B5D9965A014","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1888940$CFAA3820-FED7-424F-9B7D-84FB69E57864","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1888940$11071FCC-E627-473D-9C45-70EFF9A87778","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"2bfadd15455d1d90bb9ee1f4a9bcb37a9de3a7e7","datavalue":{"value":"2120276","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1888940$F8AE3988-F2C3-4DF3-B900-ED1194409469","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1888940$69C2086A-C117-459C-91BE-50B986D3F2F2","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"04bf2cb1ee9a136515a7984303986e9571e7d11c","datavalue":{"value":"https://doi.org/10.1007/b97182","type":"string"},"datatype":"url"},"type":"statement","id":"Q1888940$59684201-1960-4592-98D1-605AD04BF04C","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"f2ecc30c51809d4f66981d9a26c1823a5108d080","datavalue":{"value":"W2477185671","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1888940$B33BB78A-EE9F-44FA-B055-846906BDEE99","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"6e65ce80e8f2473c95e9609b4d02cbcc930d1df3","datavalue":{"value":"10.1007/B97182","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q1888940$92A022BB-36C7-4247-A068-071D15698A40","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Advances_in_cryptology_--_EUROCRYPT_2004._International_conference_on_the_theory_and_applications_of_cryptographic_techniques,_Interlaken,_Switzerland,_May_2--6,_2004._Proceedings."}}}}}