| 2004 | A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. Tatsuyuki Matsushita, Hideki Imai |
| 2004 | Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings Pil Joong Lee |
| 2004 | Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract). Bartosz Przydatek, Reto Strobl |
| 2004 | Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis |
| 2004 | Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. Feng Bao |
| 2004 | Comparison Between XL and Gröbner Basis Algorithms. Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita |
| 2004 | Constant-Round Authenticated Group Key Exchange for Dynamic Groups. Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee |
| 2004 | Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. Yi Lu, Serge Vaudenay |
| 2004 | Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. Aggelos Kiayias, Moti Yung |
| 2004 | Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. Phillip Rogaway |
| 2004 | Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. Lan Nguyen, Reihaneh Safavi-Naini |
| 2004 | Eliminating Random Permutation Oracles in the Even-Mansour Cipher. Craig Gentry, Zulfikar Ramzan |
| 2004 | Generic Homomorphic Undeniable Signatures. Jean Monnerat, Serge Vaudenay |
| 2004 | Higher Order Universal One-Way Hash Functions. Deukjo Hong, Bart Preneel, Sangjin Lee |
| 2004 | How Far Can We Go Beyond Linear Cryptanalysis? Thomas Baignères, Pascal Junod, Serge Vaudenay |
| 2004 | Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti |
| 2004 | Information Security in Korea IT839 Strategy. Ho-Ick Suk |
| 2004 | Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk |
| 2004 | Masking Based Domain Extenders for UOWHFs: Bounds and Constructions. Palash Sarkar |
| 2004 | New Approaches to Password Authenticated Key Exchange Based on RSA. Muxiang Zhang |
| 2004 | OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. Duong Hieu Phan, David Pointcheval |
| 2004 | On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. Taizo Shirai, Bart Preneel |
| 2004 | On Provably Secure Time-Stamping Schemes. Ahto Buldas, Märt Saarepera |
| 2004 | On the Generalized Linear Equivalence of Functions Over Finite Fields. Luca Breveglieri, Alessandra Cherubini, Marco Macchetti |
| 2004 | On the Security of MOR Public Key Cryptosystem. In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek |
| 2004 | Practical Two-Party Computation Based on the Conditional Gate. Berry Schoenmakers, Pim Tuyls |
| 2004 | Privacy in Non-private Environments. Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey |
| 2004 | Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups. Eonkyung Lee |
| 2004 | Secret Handshakes from CA-Oblivious Encryption. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik |
| 2004 | Sieving Using Bucket Sort. Kazumaro Aoki, Hiroki Ueda |
| 2004 | Stream Ciphers: Dead or Alive? Adi Shamir |
| 2004 | Strong Conditional Oblivious Transfer and Computing on Intervals. Ian F. Blake, Vladimir Kolesnikov |
| 2004 | The Davies-Murphy Power Attack. Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette |
| 2004 | The MD2 Hash Function Is Not One-Way. Frédéric Muller |
| 2004 | The XL-Algorithm and a Conjecture from Commutative Algebra. Claus Diem |
| 2004 | Time-Memory Trade-Off Attacks on Multiplications and T-Functions. Joydip Mitra, Palash Sarkar |
| 2004 | Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. Mihir Bellare, Adriana Palacio |
| 2004 | k-Times Anonymous Authentication (Extended Abstract). Isamu Teranishi, Jun Furukawa, Kazue Sako |