Advances in Cryptology - EUROCRYPT 2004

International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings

Editors:

ISBN: 978-3-540-21935-4 (Print) 978-3-540-24676-3 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Private Computation

    1. Book Chapter

      Pages 1-19

      Efficient Private Matching and Set Intersection

    2. Book Chapter

      Pages 20-39

      Positive Results and Techniques for Obfuscation

    3. Book Chapter

      Pages 40-55

      Secure Computation of the k th -Ranked Element

  3. Signatures I

    1. Book Chapter

      Pages 56-73

      Short Signatures Without Random Oracles

    2. Book Chapter

      Pages 74-90

      Sequential Aggregate Signatures from Trapdoor Permutations

  4. Unconditional Security

    1. Book Chapter

      Pages 91-108

      On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission

    2. Book Chapter

      Pages 109-125

      The Exact Price for Unconditionally Secure Asymmetric Cryptography

    3. Book Chapter

      Pages 126-137

      On Generating the Initial Key in the Bounded-Storage Model

  5. Distributed Cryptography

    1. Book Chapter

      Pages 138-152

      Practical Large-Scale Distributed Key Generation

    2. Book Chapter

      Pages 153-170

      Optimal Communication Complexity of Generic Multicast Key Distribution

  6. Foundations I

    1. Book Chapter

      Pages 171-188

      An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem

    2. Book Chapter

      Pages 189-206

      Black-Box Composition Does Not Imply Adaptive Security

  7. Identity-Based Encryption

    1. Book Chapter

      Pages 207-222

      Chosen-Ciphertext Security from Identity-Based Encryption

    2. Book Chapter

      Pages 223-238

      Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles

  8. Elliptic Curves

    1. Book Chapter

      Pages 239-256

      Construction of Secure Random Curves of Genus 2 over Prime Fields

    2. Book Chapter

      Pages 257-267

      Projective Coordinates Leak

  9. Signatures II

    1. Book Chapter

      Pages 268-286

      Security Proofs for Identity-Based Identification and Signature Schemes

    2. Book Chapter

      Pages 287-305

      Concurrent Signatures

    3. Book Chapter

      Pages 306-322

      The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures

  10. Public-Key Cryptography

    1. Book Chapter

      Pages 323-341

      Public-Key Steganography

previous Page of 2