Advances in Cryptology – CRYPTO 2004

24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings


ISBN: 978-3-540-22668-0 (Print) 978-3-540-28628-8 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Linear Cryptanalysis

    1. Book Chapter

      Pages 1-22

      On Multiple Linear Approximations

    2. Book Chapter

      Pages 23-40

      Feistel Schemes and Bi-linear Cryptanalysis

  3. Group Signatures

    1. Book Chapter

      Pages 41-55

      Short Group Signatures

    2. Book Chapter

      Pages 56-72

      Signature Schemes and Anonymous Credentials from Bilinear Maps

  4. Foundations

    1. Book Chapter

      Pages 73-91

      Complete Classification of Bilinear Hard-Core Functions

    2. Book Chapter

      Pages 92-105

      Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?

    3. Book Chapter

      Pages 106-122

      Security of Random Feistel Schemes with 5 or More Rounds

  5. Efficient Representations

    1. Book Chapter

      Pages 123-139

      Signed Binary Representations Revisited

    2. Book Chapter

      Pages 140-156

      Compressed Pairings

    3. Book Chapter

      Pages 157-178

      Asymptotically Optimal Communication for Torus-Based Cryptography

    4. Book Chapter

      Pages 179-200

      How to Compress Rabin Ciphertexts and Signatures (and More)

  6. Public Key Cryptanalysis

    1. Book Chapter

      Pages 201-212

      On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields

    2. Book Chapter

      Pages 213-219

      Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring

  7. Zero-Knowledge

    1. Book Chapter

      Pages 220-236

      Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks

    2. Book Chapter

      Pages 237-253

      Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model

    3. Book Chapter

      Pages 254-272

      Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks

    4. Book Chapter

      Pages 273-289

      The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols

  8. Hash Collisions

    1. Book Chapter

      Pages 290-305

      Near-Collisions of SHA-0

    2. Book Chapter

      Pages 306-316

      Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions

  9. Secure Computation

    1. Book Chapter

      Pages 317-334

      Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography

previous Page of 2