EUROCRYPT A*

37 papers

YearTitle / Authors
2004Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings
Christian Cachin, Jan Camenisch
2004Algebraic Attacks and Decomposition of Boolean Functions.
Willi Meier, Enes Pasalic, Claude Carlet
2004An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem.
Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
2004Anonymous Identification in Ad Hoc Groups.
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup
2004Black-Box Composition Does Not Imply Adaptive Security.
Steven A. Myers
2004Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3.
Phong Q. Nguyen
2004Chosen-Ciphertext Security from Identity-Based Encryption.
Ran Canetti, Shai Halevi, Jonathan Katz
2004Concurrent Signatures.
Liqun Chen, Caroline Kudla, Kenneth G. Paterson
2004Construction of Secure Random Curves of Genus 2 over Prime Fields.
Pierrick Gaudry, Éric Schost
2004Dining Cryptographers Revisited.
Philippe Golle, Ari Juels
2004Efficient Private Matching and Set Intersection.
Michael J. Freedman, Kobbi Nissim, Benny Pinkas
2004Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.
Dan Boneh, Xavier Boyen
2004Finding Small Roots of Bivariate Integer Polynomial Equations Revisited.
Jean-Sébastien Coron
2004Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
Yevgeniy Dodis, Leonid Reyzin, Adam D. Smith
2004Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme.
Stanislaw Jarecki, Vitaly Shmatikov
2004Hash Function Balance and Its Impact on Birthday Attacks.
Mihir Bellare, Tadayoshi Kohno
2004Immunizing Encryption Schemes from Decryption Errors.
Cynthia Dwork, Moni Naor, Omer Reingold
2004Merkle Tree Traversal in Log Space and Time.
Michael Szydlo
2004Multi-party Computation with Hybrid Security.
Matthias Fitzi, Thomas Holenstein, Jürg Wullschleger
2004On Generating the Initial Key in the Bounded-Storage Model.
Stefan Dziembowski, Ueli M. Maurer
2004On Simulation-Sound Trapdoor Commitments.
Philip D. MacKenzie, Ke Yang
2004On the Hardness of Information-Theoretic Multiparty Computation.
Yuval Ishai, Eyal Kushilevitz
2004On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission.
Ivan Damgård, Thomas Pedersen, Louis Salvail
2004Optimal Communication Complexity of Generic Multicast Key Distribution.
Daniele Micciancio, Saurabh Panjwani
2004Positive Results and Techniques for Obfuscation.
Ben Lynn, Manoj Prabhakaran, Amit Sahai
2004Practical Large-Scale Distributed Key Generation.
John F. Canny, Stephen Sorkin
2004Projective Coordinates Leak.
David Naccache, Nigel P. Smart, Jacques Stern
2004Public Key Encryption with Keyword Search.
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
2004Public-Key Steganography.
Luis von Ahn, Nicholas J. Hopper
2004Secure Computation of the k th-Ranked Element.
Gagan Aggarwal, Nina Mishra, Benny Pinkas
2004Secure Hashed Diffie-Hellman over Non-DDH Groups.
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2004Security Proofs for Identity-Based Identification and Signature Schemes.
Mihir Bellare, Chanathip Namprempre, Gregory Neven
2004Sequential Aggregate Signatures from Trapdoor Permutations.
Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
2004Short Signatures Without Random Oracles.
Dan Boneh, Xavier Boyen
2004The Exact Price for Unconditionally Secure Asymmetric Cryptography.
Renato Renner, Stefan Wolf
2004The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.
Tal Malkin, Satoshi Obana, Moti Yung
2004Traceable Signatures.
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung