| 2004 | Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings Christian Cachin, Jan Camenisch |
| 2004 | Algebraic Attacks and Decomposition of Boolean Functions. Willi Meier, Enes Pasalic, Claude Carlet |
| 2004 | An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. Mihir Bellare, Alexandra Boldyreva, Adriana Palacio |
| 2004 | Anonymous Identification in Ad Hoc Groups. Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup |
| 2004 | Black-Box Composition Does Not Imply Adaptive Security. Steven A. Myers |
| 2004 | Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. Phong Q. Nguyen |
| 2004 | Chosen-Ciphertext Security from Identity-Based Encryption. Ran Canetti, Shai Halevi, Jonathan Katz |
| 2004 | Concurrent Signatures. Liqun Chen, Caroline Kudla, Kenneth G. Paterson |
| 2004 | Construction of Secure Random Curves of Genus 2 over Prime Fields. Pierrick Gaudry, Éric Schost |
| 2004 | Dining Cryptographers Revisited. Philippe Golle, Ari Juels |
| 2004 | Efficient Private Matching and Set Intersection. Michael J. Freedman, Kobbi Nissim, Benny Pinkas |
| 2004 | Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. Dan Boneh, Xavier Boyen |
| 2004 | Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. Jean-Sébastien Coron |
| 2004 | Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Yevgeniy Dodis, Leonid Reyzin, Adam D. Smith |
| 2004 | Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. Stanislaw Jarecki, Vitaly Shmatikov |
| 2004 | Hash Function Balance and Its Impact on Birthday Attacks. Mihir Bellare, Tadayoshi Kohno |
| 2004 | Immunizing Encryption Schemes from Decryption Errors. Cynthia Dwork, Moni Naor, Omer Reingold |
| 2004 | Merkle Tree Traversal in Log Space and Time. Michael Szydlo |
| 2004 | Multi-party Computation with Hybrid Security. Matthias Fitzi, Thomas Holenstein, Jürg Wullschleger |
| 2004 | On Generating the Initial Key in the Bounded-Storage Model. Stefan Dziembowski, Ueli M. Maurer |
| 2004 | On Simulation-Sound Trapdoor Commitments. Philip D. MacKenzie, Ke Yang |
| 2004 | On the Hardness of Information-Theoretic Multiparty Computation. Yuval Ishai, Eyal Kushilevitz |
| 2004 | On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. Ivan Damgård, Thomas Pedersen, Louis Salvail |
| 2004 | Optimal Communication Complexity of Generic Multicast Key Distribution. Daniele Micciancio, Saurabh Panjwani |
| 2004 | Positive Results and Techniques for Obfuscation. Ben Lynn, Manoj Prabhakaran, Amit Sahai |
| 2004 | Practical Large-Scale Distributed Key Generation. John F. Canny, Stephen Sorkin |
| 2004 | Projective Coordinates Leak. David Naccache, Nigel P. Smart, Jacques Stern |
| 2004 | Public Key Encryption with Keyword Search. Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano |
| 2004 | Public-Key Steganography. Luis von Ahn, Nicholas J. Hopper |
| 2004 | Secure Computation of the k th-Ranked Element. Gagan Aggarwal, Nina Mishra, Benny Pinkas |
| 2004 | Secure Hashed Diffie-Hellman over Non-DDH Groups. Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
| 2004 | Security Proofs for Identity-Based Identification and Signature Schemes. Mihir Bellare, Chanathip Namprempre, Gregory Neven |
| 2004 | Sequential Aggregate Signatures from Trapdoor Permutations. Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham |
| 2004 | Short Signatures Without Random Oracles. Dan Boneh, Xavier Boyen |
| 2004 | The Exact Price for Unconditionally Secure Asymmetric Cryptography. Renato Renner, Stefan Wolf |
| 2004 | The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. Tal Malkin, Satoshi Obana, Moti Yung |
| 2004 | Traceable Signatures. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung |