CRYPTO A*

35 papers

YearTitle / Authors
2004A New Paradigm of Hybrid Encryption Scheme.
Kaoru Kurosawa, Yvo Desmedt
2004Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography.
Masayuki Abe, Serge Fehr
2004Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings
Matthew K. Franklin
2004An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators.
Håvard Molland, Tor Helleseth
2004Asymptotically Optimal Communication for Torus-Based Cryptography.
Marten van Dijk, David P. Woodruff
2004Complete Classification of Bilinear Hard-Core Functions.
Thomas Holenstein, Ueli M. Maurer, Johan Sjödin
2004Compressed Pairings.
Michael Scott, Paulo S. L. M. Barreto
2004Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring.
Alexander May
2004Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model.
Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti
2004Efficient Tree-Based Revocation in Groups of Low-State Devices.
Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia
2004Faster Correlation Attack on Bluetooth Keystream Generator E0.
Yi Lu, Serge Vaudenay
2004Feistel Schemes and Bi-linear Cryptanalysis.
Nicolas T. Courtois
2004Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Chun-Yuan Hsiao, Leonid Reyzin
2004How to Compress Rabin Ciphertexts and Signatures (and More).
Craig Gentry
2004IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange.
Dario Catalano, David Pointcheval, Thomas Pornin
2004Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks.
Rosario Gennaro
2004Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.
Antoine Joux
2004Near-Collisions of SHA-0.
Eli Biham, Rafi Chen
2004Non-interactive Timestamping in the Bounded Storage Model.
Tal Moran, Ronen Shaltiel, Amnon Ta-Shma
2004On Multiple Linear Approximations.
Alex Biryukov, Christophe De Cannière, Michaël Quisquater
2004On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields.
Qi Cheng
2004Optimal Perfectly Secure Message Transmission.
K. Srinathan, Arvind Narayanan, C. Pandu Rangan
2004Privacy-Preserving Datamining on Vertically Partitioned Databases.
Cynthia Dwork, Kobbi Nissim
2004Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness.
Matthias Fitzi, Stefan Wolf, Jürg Wullschleger
2004Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin
2004Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers.
Philip Hawkes, Gregory G. Rose
2004Round-Optimal Secure Two-Party Computation.
Jonathan Katz, Rafail Ostrovsky
2004Secure Identity Based Encryption Without Random Oracles.
Dan Boneh, Xavier Boyen
2004Security of Random Feistel Schemes with 5 or More Rounds.
Jacques Patarin
2004Security, Liberty, and Electronic Communications.
Susan Landau
2004Short Group Signatures.
Dan Boneh, Xavier Boyen, Hovav Shacham
2004Signature Schemes and Anonymous Credentials from Bilinear Maps.
Jan Camenisch, Anna Lysyanskaya
2004Signed Binary Representations Revisited.
Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
2004The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols.
Mihir Bellare, Adriana Palacio
2004Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks.
Ivan Damgård, Serge Fehr, Louis Salvail