default search action
ASIACRYPT 2004: Jeju Island, Korea
- Pil Joong Lee:
Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings. Lecture Notes in Computer Science 3329, Springer 2004, ISBN 3-540-23975-8
Block Ciphers
- Taizo Shirai, Bart Preneel:
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. 1-15 - Phillip Rogaway:
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. 16-31 - Craig Gentry, Zulfikar Ramzan:
Eliminating Random Permutation Oracles in the Even-Mansour Cipher. 32-47
Public Key Encryption
- Mihir Bellare, Adriana Palacio:
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. 48-62 - Duong Hieu Phan, David Pointcheval:
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. 63-77
Invited Talk I
- Adi Shamir:
Stream Ciphers: Dead or Alive? 78
Number Theory and Algebra
- Luca Breveglieri, Alessandra Cherubini, Marco Macchetti:
On the Generalized Linear Equivalence of Functions Over Finite Fields. 79-91 - Kazumaro Aoki, Hiroki Ueda:
Sieving Using Bucket Sort. 92-102 - Eonkyung Lee:
Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups. 103-118
Secure Computation
- Berry Schoenmakers, Pim Tuyls:
Practical Two-Party Computation Based on the Conditional Gate. 119-136 - Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey:
Privacy in Non-private Environments. 137-151 - Bartosz Przydatek, Reto Strobl:
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract). 152-169 - Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk:
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. 170-186
Hash Functions
- Palash Sarkar:
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions. 187-200 - Deukjo Hong, Bart Preneel, Sangjin Lee:
Higher Order Universal One-Way Hash Functions. 201-213 - Frédéric Muller:
The MD2 Hash Function Is Not One-Way. 214-229
Key Management
- Muxiang Zhang:
New Approaches to Password Authenticated Key Exchange Based on RSA. 230-244 - Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee:
Constant-Round Authenticated Group Key Exchange for Dynamic Groups. 245-259 - Tatsuyuki Matsushita, Hideki Imai:
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. 260-275
Identification
- Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis:
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. 276-292 - Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. 293-307 - Isamu Teranishi, Jun Furukawa, Kazue Sako:
k-Times Anonymous Authentication (Extended Abstract). 308-322
XL-Algorithms
- Claus Diem:
The XL-Algorithm and a Conjecture from Commutative Algebra. 323-337 - Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita:
Comparison Between XL and Gröbner Basis Algorithms. 338-353
Digital Signatures
- Jean Monnerat, Serge Vaudenay:
Generic Homomorphic Undeniable Signatures. 354-371 - Lan Nguyen, Reihaneh Safavi-Naini:
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. 372-386
Public Key Cryptanalysis
- In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek:
On the Security of MOR Public Key Cryptosystem. 387-400 - Aggelos Kiayias, Moti Yung:
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. 401-416 - Feng Bao:
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. 417-429
Invited Talk II
- Ho-Ick Suk:
Information Security in Korea IT839 Strategy. 430-431
Symmetric Key Cryptanalysis
- Thomas Baignères, Pascal Junod, Serge Vaudenay:
How Far Can We Go Beyond Linear Cryptanalysis? 432-450 - Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette:
The Davies-Murphy Power Attack. 451-467 - Joydip Mitra, Palash Sarkar:
Time-Memory Trade-Off Attacks on Multiplications and T-Functions. 468-482 - Yi Lu, Serge Vaudenay:
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. 483-499
Protocols
- Ahto Buldas, Märt Saarepera:
On Provably Secure Time-Stamping Schemes. 500-514 - Ian F. Blake, Vladimir Kolesnikov:
Strong Conditional Oblivious Transfer and Computing on Intervals. 515-529 - Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti:
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. 530-544
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.