Book Volume 3329 2004

Advances in Cryptology - ASIACRYPT 2004

10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings


ISBN: 978-3-540-23975-8 (Print) 978-3-540-30539-2 (Online)

Table of contents (37 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Block Ciphers

    1. Chapter

      Pages 1-15

      On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds

    2. Chapter

      Pages 16-31

      Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC

    3. Chapter

      Pages 32-47

      Eliminating Random Permutation Oracles in the Even-Mansour Cipher

  3. Public Key Encryption

    1. Chapter

      Pages 48-62

      Towards Plaintext-Aware Public-Key Encryption Without Random Oracles

    2. Chapter

      Pages 63-77

      OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding

  4. Invited Talk I

    1. Chapter

      Pages 78-78

      Stream Ciphers: Dead or Alive?

  5. Number Theory and Algebra

    1. Chapter

      Pages 79-91

      On the Generalized Linear Equivalence of Functions Over Finite Fields

    2. Chapter

      Pages 92-102

      Sieving Using Bucket Sort

    3. Chapter

      Pages 103-118

      Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups

  6. Secure Computation

    1. Chapter

      Pages 119-136

      Practical Two-Party Computation Based on the Conditional Gate

    2. Chapter

      Pages 137-151

      Privacy in Non-private Environments

    3. Chapter

      Pages 152-169

      Asynchronous Proactive Cryptosystems Without Agreement

    4. Chapter

      Pages 170-186

      Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes

  7. Hash Functions

    1. Chapter

      Pages 187-200

      Masking Based Domain Extenders for UOWHFs: Bounds and Constructions

    2. Chapter

      Pages 201-213

      Higher Order Universal One-Way Hash Functions

    3. Chapter

      Pages 214-229

      The MD2 Hash Function Is Not One-Way

  8. Key Management

    1. Chapter

      Pages 230-244

      New Approaches to Password Authenticated Key Exchange Based on RSA

    2. Chapter

      Pages 245-259

      Constant-Round Authenticated Group Key Exchange for Dynamic Groups

    3. Chapter

      Pages 260-275

      A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates

  9. Identification

    1. Chapter

      Pages 276-292

      Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices

previous Page of 2