Advances in Cryptology - ASIACRYPT 2004 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings /

The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5-9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Researc...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Lee, Pil Joong (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Έκδοση:1st ed. 2004.
Σειρά:Lecture Notes in Computer Science, 3329
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Block Ciphers
  • On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
  • Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
  • Eliminating Random Permutation Oracles in the Even-Mansour Cipher
  • Public Key Encryption
  • Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
  • OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
  • Invited Talk I
  • Stream Ciphers: Dead or Alive?
  • Number Theory and Algebra
  • On the Generalized Linear Equivalence of Functions Over Finite Fields
  • Sieving Using Bucket Sort
  • Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups
  • Secure Computation
  • Practical Two-Party Computation Based on the Conditional Gate
  • Privacy in Non-private Environments
  • Asynchronous Proactive Cryptosystems Without Agreement
  • Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
  • Hash Functions
  • Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
  • Higher Order Universal One-Way Hash Functions
  • The MD2 Hash Function Is Not One-Way
  • Key Management
  • New Approaches to Password Authenticated Key Exchange Based on RSA
  • Constant-Round Authenticated Group Key Exchange for Dynamic Groups
  • A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
  • Identification
  • Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
  • Secret Handshakes from CA-Oblivious Encryption
  • k-Times Anonymous Authentication (Extended Abstract)
  • XL-Algorithms
  • The XL-Algorithm and a Conjecture from Commutative Algebra
  • Comparison Between XL and Gröbner Basis Algorithms
  • Digital Signatures
  • Generic Homomorphic Undeniable Signatures
  • Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings
  • Public Key Cryptanalysis
  • On the Security of MOR Public Key Cryptosystem
  • Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice
  • Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
  • Invited Talk II
  • Information Security in Korea IT839 Strategy
  • Symmetric Key Cryptanalysis
  • How Far Can We Go Beyond Linear Cryptanalysis?
  • The Davies-Murphy Power Attack
  • Time-Memory Trade-Off Attacks on Multiplications and T-Functions
  • Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
  • Protocols
  • On Provably Secure Time-Stamping Schemes
  • Strong Conditional Oblivious Transfer and Computing on Intervals
  • Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.