Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project
EUROCRYPT 2004: Interlaken, Switzerland
Christian Cachin , Jan Camenisch (Eds.): Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. Lecture Notes in Computer Science 3027 Springer 2004, ISBN 3-540-21935-8 BibTeX
PREFACE by Christian Cachin and Jan Camenisch
Sponsored by the
International Association for Cryptologic Research (IACR)
in cooperation with the
IBM Zurich Research Laboratory, Switzerland
Program and General Chairs
Christian Cachin and Jan Camenisch
IBM Zurich Research Laboratory, Switzerland
Program Committee
Alex Biryukov | ..... | Katholieke Universiteit Leuven, Belgium |
John Black | ..... | University of Colorado at Boulder, USA |
Christian Cachin | ..... | IBM Zurich Research Laboratory, Switzerland |
Jan Camenisch | ..... | IBM Zurich Research Laboratory, Switzerland |
Jean-Sébastien Coron | ..... | Gemplus Card International, France |
Claude Crépeau | ..... | McGill University, Canada |
Ivan Damgård | ..... | Aarhus University, Denmark |
Juan Garay | ..... | Bell Labs - Lucent Technologies, USA |
Rosario Gennaro | ..... | IBM T.J. Watson Research Center, USA |
Alain Hiltgen | ..... | UBS, Switzerland |
Thomas Johansson | ..... | Lund University, Sweden |
Antoine Joux | ..... | DCSSI Crypto Lab, France |
Joe Kilian | ..... | NEC Laboratories America, USA |
Arjen Lenstra | ..... | Citibank, USA & TU Eindhoven, The Netherlands |
Yehuda Lindell | ..... | IBM T.J. Watson Research Center, USA |
Anna Lysyanskaya | ..... | Brown University, USA |
Daniele Micciancio | ..... | UC San Diego, USA |
Omer Reingold | ..... | Weizmann Institute of Science, Israel |
Vincent Rijmen | ..... | Cryptomathic and IAIK, Belgium |
Phillip Rogaway | ..... | UC Davis, USA & Chiang Mai University, Thailand |
Igor Shparlinski | ..... | Macquarie University, Australia |
Edlyn Teske | ..... | University of Waterloo, Canada |
Rebecca Wright | ..... | Stevens Institute of Technology, USA |
TABLE OF CONTENTS
Private Computation
-
Michael J. Freedman
,
Kobbi Nissim
,
Benny Pinkas
:
Efficient Private Matching and Set Intersection. (.ps) 1-19
BibTeX -
Ben Lynn
,
Manoj Prabhakaran
,
Amit Sahai
:
Positive Results and Techniques for Obfuscation. (.ps) 20-39
BibTeX -
Gagan Aggarwal
,
Nina Mishra
,
Benny Pinkas
:
Secure Computation of the k th-Ranked Element. (.ps) 40-55
BibTeX
Signatures I
-
Dan Boneh
,
Xavier Boyen
:
Short Signatures Without Random Oracles. (.ps) 56-73
BibTeX -
Anna Lysyanskaya
,
Silvio Micali
,
Leonid Reyzin
,
Hovav Shacham
:
Sequential Aggregate Signatures from Trapdoor Permutations. (.ps) 74-90
BibTeX
Unconditional Security
-
Ivan Damgård
,
Thomas Pedersen
,
Louis Salvail
:
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. (.ps) 91-108
BibTeX -
Renato Renner
,
Stefan Wolf
:
The Exact Price for Unconditionally Secure Asymmetric Cryptography. (.ps) 109-125
BibTeX -
Stefan Dziembowski
,
Ueli M. Maurer
:
On Generating the Initial Key in the Bounded-Storage Model. (.ps) 126-137
BibTeX
Distributed Cryptography
-
John F. Canny
,
Stephen Sorkin
:
Practical Large-Scale Distributed Key Generation. (.ps) 138-152
BibTeX -
Daniele Micciancio
,
Saurabh Panjwani
:
Optimal Communication Complexity of Generic Multicast Key Distribution. (.ps) 153-170
BibTeX
Foundations I
-
Mihir Bellare
,
Alexandra Boldyreva
,
Adriana Palacio
:
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. (.ps) 171-188
BibTeX -
Steven Myers
:
Black-Box Composition Does Not Imply Adaptive Security. (.ps) 189-206
BibTeX
Identity-Based Encryption
-
Ran Canetti
,
Shai Halevi
,
Jonathan Katz
:
Chosen-Ciphertext Security from Identity-Based Encryption. (.ps) 207-222
BibTeX -
Dan Boneh
,
Xavier Boyen
:
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. (.ps) 223-238
BibTeX
Elliptic Curves
-
Pierrick Gaudry
,
Éric Schost
:
Construction of Secure Random Curves of Genus 2 over Prime Fields. (.ps) 239-256
BibTeX -
David Naccache
,
Nigel P. Smart
,
Jacques Stern
:
Projective Coordinates Leak. (.ps) 257-267
BibTeX
Signatures II
-
Mihir Bellare
,
Chanathip Namprempre
,
Gregory Neven
:
Security Proofs for Identity-Based Identification and Signature Schemes. (.ps) 268-286
BibTeX -
Liqun Chen
,
Caroline Kudla
,
Kenneth G. Paterson
:
Concurrent Signatures. (.ps) 287-305
BibTeX -
Tal Malkin
,
Satoshi Obana
,
Moti Yung
:
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. (.ps) 306-322
BibTeX
Public-Key Cryptography
-
Luis von Ahn
,
Nicholas J. Hopper
:
Public-Key Steganography. (.ps) 323-341
BibTeX -
Cynthia Dwork
,
Moni Naor
,
Omer Reingold
:
Immunizing Encryption Schemes from Decryption Errors. (.ps) 342-360
BibTeX -
Rosario Gennaro
,
Hugo Krawczyk
,
Tal Rabin
:
Secure Hashed Diffie-Hellman over Non-DDH Groups. (.ps) 361-381
BibTeX
Foundations II
-
Philip D. MacKenzie
,
Ke Yang
:
On Simulation-Sound Trapdoor Commitments. (.ps) 382-400
BibTeX -
Mihir Bellare
,
Tadayoshi Kohno
:
Hash Function Balance and Its Impact on Birthday Attacks. (.ps) 401-418
BibTeX
Multiparty Computation
-
Matthias Fitzi
,
Thomas Holenstein
,
Jürg Wullschleger
:
Multi-party Computation with Hybrid Security. (.ps) 419-438
BibTeX -
Yuval Ishai
,
Eyal Kushilevitz
:
On the Hardness of Information-Theoretic Multiparty Computation. (.ps) 439-455
BibTeX -
Philippe Golle
,
Ari Juels
:
Dining Cryptographers Revisited. (.ps) 456-473
BibTeX
Cryptanalysis
-
Willi Meier
,
Enes Pasalic
,
Claude Carlet
:
Algebraic Attacks and Decomposition of Boolean Functions. (.ps) 474-491
BibTeX -
Jean-Sébastien Coron
:
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. (.ps) 492-505
BibTeX
New Applications
-
Dan Boneh
,
Giovanni Di Crescenzo
,
Rafail Ostrovsky
,
Giuseppe Persiano
:
Public Key Encryption with Keyword Search. (.ps) 506-522
BibTeX -
Yevgeniy Dodis
,
Leonid Reyzin
,
Adam Smith
:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. (.ps) 523-540
BibTeX
Algorithms and Implementations
-
Michael Szydlo
:
Merkle Tree Traversal in Log Space and Time. (.ps) 541-554
BibTeX -
Phong Q. Nguyen
:
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. (.ps) 555-570
BibTeX
Anonymity
-
Aggelos Kiayias
,
Yiannis Tsiounis
,
Moti Yung
:
Traceable Signatures. (.ps) 571-589
BibTeX -
Stanislaw Jarecki
,
Vitaly Shmatikov
:
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. (.ps) 590-608
BibTeX -
Yevgeniy Dodis
,
Aggelos Kiayias
,
Antonio Nicolosi
,
Victor Shoup
:
Anonymous Identification in Ad Hoc Groups. (.ps) 609-626
BibTeX