© 2004

Advances in Cryptology - ASIACRYPT 2004

10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings

  • Pil Joong Lee
Conference proceedings ASIACRYPT 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3329)

Table of contents

  1. Front Matter
  2. Block Ciphers

  3. Public Key Encryption

    1. Duong Hieu Phan, David Pointcheval
      Pages 63-77
  4. Invited Talk I

    1. Adi Shamir
      Pages 78-78
  5. Number Theory and Algebra

    1. Luca Breveglieri, Alessandra Cherubini, Marco Macchetti
      Pages 79-91
    2. Kazumaro Aoki, Hiroki Ueda
      Pages 92-102
  6. Secure Computation

    1. Berry Schoenmakers, Pim Tuyls
      Pages 119-136
    2. Markus Bläser, Andreas Jakoby, Maciej Liśkiewicz, Bodo Manthey
      Pages 137-151
    3. Bartosz Przydatek, Reto Strobl
      Pages 152-169
    4. Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
      Pages 170-186
  7. Hash Functions

    1. Deukjo Hong, Bart Preneel, Sangjin Lee
      Pages 201-213
    2. Frédéric Muller
      Pages 214-229
  8. Key Management

About these proceedings


The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.


Bluetooth Information Oracle RSA block ciphers communication computational number theory cryptographic protocols cryptography data security finite field privacy security stream ciphers systems security

Editors and affiliations

  • Pil Joong Lee
    • 1
  1. 1.Dept. of Electronic and Electrical Eng.POSTECHPohangKorea

Bibliographic information