Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project

CRYPTO 2004: Santa Barbara, California, USA


Matthew K. Franklin (Ed.): Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings. Lecture Notes in Computer Science 3152 Springer 2004, ISBN 3-540-22668-0 BibTeX

PREFACE by Matt Franklin

Sponsored by the
International Association for Cryptologic Research (IACR) in cooperation with
IEEE Computer Society Technical Committee on Security and Privacy, and
Computer Science Department, University of California, Santa Barbara

General Chair
James Hughes, StorageTek

Program Chair
Matt Franklin, U. C. Davis, USA

Program Committee

Bill Aiello ..... AT&T Labs, USA
Jee Hea An ..... SoftMax, USA
Eli Biham ..... Technion, Israel
John Black ..... University of Colorado at Boulder, USA
Anne Canteaut ..... INRIA, France
Ronald Cramer ..... University of Aarhus, Denmark
Yevgeniy Dodis ..... New York University, USA
Yuval Ishai ..... Technion, Israel
Lars Knudsen ..... Technical University of Denmark, Denmark
Hugo Krawczyk ..... Technion/IBM, Israel/USA
Pil Joong Lee ..... POSTECH/KT, Korea
Phil MacKenzie ..... Bell Labs, USA
Tal Malkin ..... Columbia University, USA
Willi Meier ..... Fachhochschule Aargau, Switzerland
Daniele Micciancio ..... U. C. San Diego, USA
Ilya Mironov ..... Microsoft Research, USA
Tatsuaki Okamoto ..... NTT, Japan
Rafail Ostrovsky ..... U. C. L. A., USA
Torben Pedersen ..... Cryptomathic, Denmark
Benny Pinkas ..... HP Labs, USA
Bart Preneel ..... Katholieke Universiteit Leuven, Belgium
Alice Silverberg ..... Ohio State University, USA
Nigel Smart ..... Bristol University, UK
David Wagner ..... U. C. Berkeley, USA
Stefan Wolf ..... University of Montreal, Canada

Advisory Members

Dan Boneh (Crypto 2003 Program Chair) ..... Stanford University, USA
Victor Shoup (Crypto 2005 Program Chair) ..... New York University, USA

External Reviewers


TABLE OF CONTENTS

Linear Cryptanalysis

Group Signatures

Foundations

Efficient Representations

Public Key Cryptanalysis

Zero-Knowledge

Hash Collisions

Secure Computation

Invited Talk

Stream Cipher Cryptanalysis

Public Key Encryption

Bounded Storage Model

Key Management

Computationally Unbounded Adversaries


AUTHOR INDEX