CRYPTO 2004: Santa Barbara, California, USA
Matthew K. Franklin (Ed.): Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings. Lecture Notes in Computer Science 3152 Springer 2004, ISBN 3-540-22668-0 BibTeX
PREFACE by Matt Franklin
Sponsored by the
International Association for Cryptologic Research (IACR)
in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy, and
Computer Science Department, University of California, Santa Barbara
General Chair
James Hughes, StorageTek
Program Chair
Matt Franklin,
U. C. Davis, USA
Program Committee
Bill Aiello | ..... | AT&T Labs, USA |
Jee Hea An | ..... | SoftMax, USA |
Eli Biham | ..... | Technion, Israel |
John Black | ..... | University of Colorado at Boulder, USA |
Anne Canteaut | ..... | INRIA, France |
Ronald Cramer | ..... | University of Aarhus, Denmark |
Yevgeniy Dodis | ..... | New York University, USA |
Yuval Ishai | ..... | Technion, Israel |
Lars Knudsen | ..... | Technical University of Denmark, Denmark |
Hugo Krawczyk | ..... | Technion/IBM, Israel/USA |
Pil Joong Lee | ..... | POSTECH/KT, Korea |
Phil MacKenzie | ..... | Bell Labs, USA |
Tal Malkin | ..... | Columbia University, USA |
Willi Meier | ..... | Fachhochschule Aargau, Switzerland |
Daniele Micciancio | ..... | U. C. San Diego, USA |
Ilya Mironov | ..... | Microsoft Research, USA |
Tatsuaki Okamoto | ..... | NTT, Japan |
Rafail Ostrovsky | ..... | U. C. L. A., USA |
Torben Pedersen | ..... | Cryptomathic, Denmark |
Benny Pinkas | ..... | HP Labs, USA |
Bart Preneel | ..... | Katholieke Universiteit Leuven, Belgium |
Alice Silverberg | ..... | Ohio State University, USA |
Nigel Smart | ..... | Bristol University, UK |
David Wagner | ..... | U. C. Berkeley, USA |
Stefan Wolf | ..... | University of Montreal, Canada |
Advisory Members
Dan Boneh (Crypto 2003 Program Chair) | ..... | Stanford University, USA |
Victor Shoup (Crypto 2005 Program Chair) | ..... | New York University, USA |
TABLE OF CONTENTS
Linear Cryptanalysis
-
Alex Biryukov
,
Christophe De Cannière
,
Michaël Quisquater
:
On Multiple Linear Approximations. (.ps) 1-22
BibTeX -
Nicolas Courtois
:
Feistel Schemes and Bi-linear Cryptanalysis. (.ps) 23-40
BibTeX
Group Signatures
-
Dan Boneh
,
Xavier Boyen
,
Hovav Shacham
:
Short Group Signatures. (.ps) 41-55
BibTeX -
Jan Camenisch
,
Anna Lysyanskaya
:
Signature Schemes and Anonymous Credentials from Bilinear Maps. (.ps) 56-72
BibTeX
Foundations
-
Thomas Holenstein
,
Ueli M. Maurer
,
Johan Sjödin
:
Complete Classification of Bilinear Hard-Core Functions. (.ps) 73-91
BibTeX -
Chun-Yuan Hsiao
,
Leonid Reyzin
:
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins? (.ps) 92-105
BibTeX -
Jacques Patarin
:
Security of Random Feistel Schemes with 5 or More Rounds. (.ps) 106-122
BibTeX
Efficient Representations
-
Katsuyuki Okeya
,
Katja Schmidt-Samoa
,
Christian Spahn
,
Tsuyoshi Takagi
:
Signed Binary Representations Revisited. (.ps) 123-139
BibTeX -
Michael Scott
,
Paulo S. L. M. Barreto
:
Compressed Pairings. (.ps) 140-156
BibTeX -
Marten van Dijk
,
David P. Woodruff
:
Asymptotically Optimal Communication for Torus-Based Cryptography. (.ps) 157-178
BibTeX -
Craig Gentry
:
How to Compress Rabin Ciphertexts and Signatures (and More). (.ps) 179-200
BibTeX
Public Key Cryptanalysis
-
Qi Cheng
:
On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields. (.ps) 201-212
BibTeX -
Alexander May
:
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. (.ps) 213-219
BibTeX
Zero-Knowledge
-
Rosario Gennaro
:
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. (.ps) 220-236
BibTeX -
Giovanni Di Crescenzo
,
Giuseppe Persiano
,
Ivan Visconti
:
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. (.ps) 237-253
BibTeX -
Ivan Damgård
,
Serge Fehr
,
Louis Salvail
:
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. (.ps) 254-272
BibTeX -
Mihir Bellare
,
Adriana Palacio
:
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. (.ps) 273-289
BibTeX
Hash Collisions
-
Eli Biham
,
Rafi Chen
:
Near-Collisions of SHA-0. (.ps) 290-305
BibTeX -
Antoine Joux
:
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. (.ps) 306-316
BibTeX
Secure Computation
-
Masayuki Abe
,
Serge Fehr
:
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. (.ps) 317-334
BibTeX -
Jonathan Katz
,
Rafail Ostrovsky
:
Round-Optimal Secure Two-Party Computation. (.ps) 335-354
BibTeX
Invited Talk
Stream Cipher Cryptanalysis
-
Håvard Molland
,
Tor Helleseth
:
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. (.ps) 373-389
BibTeX -
Philip Hawkes
,
Gregory G. Rose
:
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers. (.ps) 390-406
BibTeX -
Yi Lu
,
Serge Vaudenay
:
Faster Correlation Attack on Bluetooth Keystream Generator E0. (.ps) 407-425
BibTeX
Public Key Encryption
-
Kaoru Kurosawa
,
Yvo Desmedt
:
A New Paradigm of Hybrid Encryption Scheme. (.ps) 426-442
BibTeX -
Dan Boneh
,
Xavier Boyen
:
Secure Identity Based Encryption Without Random Oracles. (.ps) 443-459
BibTeX
Bounded Storage Model
-
Tal Moran
,
Ronen Shaltiel
,
Amnon Ta-Shma
:
Non-interactive Timestamping in the Bounded Storage Model. (.ps) 460-476
BibTeX
Key Management
-
Dario Catalano
,
David Pointcheval
,
Thomas Pornin
:
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. (.ps) 477-493
BibTeX -
Yevgeniy Dodis
,
Rosario Gennaro
,
Johan Håstad
,
Hugo Krawczyk
,
Tal Rabin
:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. (.ps) 494-510
BibTeX -
Michael T. Goodrich
,
Jonathan Z. Sun
,
Roberto Tamassia
:
Efficient Tree-Based Revocation in Groups of Low-State Devices. (.ps) 511-527
BibTeX
Computationally Unbounded Adversaries
-
Cynthia Dwork
,
Kobbi Nissim
:
Privacy-Preserving Datamining on Vertically Partitioned Databases. (.ps) 528-544
BibTeX -
K. Srinathan
,
Arvind Narayanan
,
C. Pandu Rangan
:
Optimal Perfectly Secure Message Transmission. (.ps) 545-561
BibTeX -
Matthias Fitzi
,
Stefan Wolf
,
Jürg Wullschleger
:
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. (.ps) 562-578
BibTeX