Advances in Cryptology - EUROCRYPT 2004 International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings /
These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr- tologic Research. Theconferencereceivedarecordnumberof206submissions,outofw...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2004.
|
Σειρά: | Lecture Notes in Computer Science,
3027 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Private Computation
- Efficient Private Matching and Set Intersection
- Positive Results and Techniques for Obfuscation
- Secure Computation of the k th -Ranked Element
- Signatures I
- Short Signatures Without Random Oracles
- Sequential Aggregate Signatures from Trapdoor Permutations
- Unconditional Security
- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission
- The Exact Price for Unconditionally Secure Asymmetric Cryptography
- On Generating the Initial Key in the Bounded-Storage Model
- Distributed Cryptography
- Practical Large-Scale Distributed Key Generation
- Optimal Communication Complexity of Generic Multicast Key Distribution
- Foundations I
- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
- Black-Box Composition Does Not Imply Adaptive Security
- Identity-Based Encryption
- Chosen-Ciphertext Security from Identity-Based Encryption
- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
- Elliptic Curves
- Construction of Secure Random Curves of Genus 2 over Prime Fields
- Projective Coordinates Leak
- Signatures II
- Security Proofs for Identity-Based Identification and Signature Schemes
- Concurrent Signatures
- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
- Public-Key Cryptography
- Public-Key Steganography
- Immunizing Encryption Schemes from Decryption Errors
- Secure Hashed Diffie-Hellman over Non-DDH Groups
- Foundations II
- On Simulation-Sound Trapdoor Commitments
- Hash Function Balance and Its Impact on Birthday Attacks
- Multiparty Computation
- Multi-party Computation with Hybrid Security
- On the Hardness of Information-Theoretic Multiparty Computation
- Dining Cryptographers Revisited
- Cryptanalysis
- Algebraic Attacks and Decomposition of Boolean Functions
- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
- New Applications
- Public Key Encryption with Keyword Search
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Algorithms and Implementation
- Merkle Tree Traversal in Log Space and Time
- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
- Anonymity
- Traceable Signatures
- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme
- Anonymous Identification in Ad Hoc Groups.