Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings. (Q1888940)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings.
scientific article

    Statements

    Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings. (English)
    0 references
    0 references
    29 November 2004
    0 references
    The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1020.00023). Indexed articles: \textit{Freedman, Michael J.; Nissim, Kobbi; Pinkas, Benny}, Efficient private matching and set intersection, 1-19 [Zbl 1122.94416] \textit{Lynn, Benjamin; Prabhakaran, Manoj; Sahai, Amit}, Positive results and techniques for obfuscation, 20-39 [Zbl 1122.94434] \textit{Aggarwal, Gagan; Mishra, Nina; Pinkas, Benny}, Secure computation of the \(k\)th-ranked element, 40-55 [Zbl 1122.68422] \textit{Boneh, Dan; Boyen, Xavier}, Short signatures without random oracles, 56-73 [Zbl 1122.94354] \textit{Lysyanskaya, Anna; Micali, Silvio; Reyzin, Leonid; Shacham, Hovav}, Sequential aggregate signatures from trapdoor permutations, 74-90 [Zbl 1122.94385] \textit{Damgård, Ivan; Pedersen, Thomas; Salvail, Louis}, On the key-uncertainty of quantum ciphers and the computational security of one-way quantum transmission, 91-108 [Zbl 1122.94367] \textit{Renner, Renato; Wolf, Stefan}, The exact price for unconditionally secure asymmetric cryptography, 109-125 [Zbl 1122.94398] \textit{Dziembowski, Stefan; Maurer, Ueli}, On generating the initial key in the bounded-storage model, 126-137 [Zbl 1122.94370] \textit{Canny, John; Sorkin, Stephen}, Practical large-scale distributed key generation, 138-152 [Zbl 1122.94361] \textit{Micciancio, Daniele; Panjwani, Saurabh}, Optimal communication complexity of generic multicast key distribution, 153-170 [Zbl 1122.94388] \textit{Bellare, Mihir; Boldyreva, Alexandra; Palacio, Adriana}, An uninstantiable random-oracle-Model scheme for a hybrid-encryption problem, 171-188 [Zbl 1122.94350] \textit{Myers, Steven}, Black-box composition does not imply adaptive security, 189-206 [Zbl 1122.94390] \textit{Canetti, Ran; Halevi, Shai; Katz, Jonathan}, Chosen-ciphertext security from identity-based encryption, 207-222 [Zbl 1122.94358] \textit{Boneh, Dan; Boyen, Xavier}, Efficient selective-id secure identity-based encryption without random oracles, 223-238 [Zbl 1122.94355] \textit{Gaudry, Pierrick; Schost, Éric}, Construction of secure random curves of genus 2 over prime fields, 239-256 [Zbl 1122.11315] \textit{Naccache, David; Smart, Nigel P.; Stern, Jacques}, Projective coordinates leak, 257-267 [Zbl 1122.14300] \textit{Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory}, Security proofs for identity-based identification and signature schemes, 268-286 [Zbl 1120.94309] \textit{Chen, Liqun; Kudla, Caroline; Paterson, Kenneth G.}, Concurrent signatures, 287-305 [Zbl 1122.94412] \textit{Malkin, Tal; Obana, Satoshi; Yung, Moti}, The hierarchy of Key evolving signatures and a characterization of proxy signatures, 306-322 [Zbl 1122.94436] \textit{von Ahn, Luis; Hopper, Nicholas J.}, Public-key steganography, 323-341 [Zbl 1122.94443] \textit{Dwork, Cynthia; Naor, Moni; Reingold, Omer}, Immunizing encryption schemes from decryption errors, 342-360 [Zbl 1122.94369] \textit{Gennaro, Rosario; Krawczyk, Hugo; Rabin, Tal}, Secure hashed Diffie-Hellman over non-DDH groups, 361-381 [Zbl 1122.94418] \textit{MacKenzie, Philip; Yang, Ke}, On simulation-sound trapdoor commitments, 382-400 [Zbl 1122.94386] \textit{Bellare, Mihir; Kohno, Tadayoshi}, Hash function balance and its impact on birthday attacks, 401-418 [Zbl 1122.94351] \textit{Fitzi, Matthias; Holenstein, Thomas; Wullschleger, Jürg}, Multi-party computation with hybrid security, 419-438 [Zbl 1122.94373] \textit{Ishai, Yuval; Kushilevitz, Eyal}, On the hardness of information-theoretic multiparty computation, 439-455 [Zbl 1122.94423] \textit{Golle, Philippe; Juels, Ari}, Dining cryptographers revisited, 456-473 [Zbl 1122.94420] \textit{Meier, Willi; Pasalic, Enes; Carlet, Claude}, Algebraic attacks and decomposition of Boolean functions, 474-491 [Zbl 1122.94041] \textit{Coron, Jean-Sébastien}, Finding small roots of bivariate integer polynomial equations revisited, 492-505 [Zbl 1122.13302] \textit{Boneh, Dan; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe}, Public key encryption with keyword search, 506-522 [Zbl 1122.68424] \textit{Dodis, Yevgeniy; Reyzin, Leonid; Smith, Adam}, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, 523-540 [Zbl 1122.94368] \textit{Szydlo, Michael}, Merkle tree traversal in log space and time, 541-554 [Zbl 1122.68751] \textit{Nguyen, Phong Q.}, Can we trust cryptographic software? Cryptographic flaws in GNU privacy guard v1.2.3, 555-570 [Zbl 1122.94392] \textit{Kiayias, Aggelos; Tsiounis, Yiannis; Yung, Moti}, Traceable signatures, 571-589 [Zbl 1122.94427] \textit{Jarecki, Stanislaw; Shmatikov, Vitaly}, Handcuffing big brother: an abuse-resilient transaction escrow scheme, 590-608 [Zbl 1122.94425] \textit{Dodis, Yevgeniy; Kiayias, Aggelos; Nicolosi, Antonio; Shoup, Victor}, Anonymous identification in ad hoc groups, 609-626 [Zbl 1122.94414]
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references