Conferences in DBLP
Alex Biryukov , Christophe De Cannière , Michaël Quisquater On Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:1-22 [Conf ] Nicolas Courtois Feistel Schemes and Bi-linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:23-40 [Conf ] Dan Boneh , Xavier Boyen , Hovav Shacham Short Group Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:41-55 [Conf ] Jan Camenisch , Anna Lysyanskaya Signature Schemes and Anonymous Credentials from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:56-72 [Conf ] Thomas Holenstein , Ueli M. Maurer , Johan Sjödin Complete Classification of Bilinear Hard-Core Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:73-91 [Conf ] Chun-Yuan Hsiao , Leonid Reyzin Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins? [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:92-105 [Conf ] Jacques Patarin Security of Random Feistel Schemes with 5 or More Rounds. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:106-122 [Conf ] Katsuyuki Okeya , Katja Schmidt-Samoa , Christian Spahn , Tsuyoshi Takagi Signed Binary Representations Revisited. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:123-139 [Conf ] Michael Scott , Paulo S. L. M. Barreto Compressed Pairings. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:140-156 [Conf ] Marten van Dijk , David P. Woodruff Asymptotically Optimal Communication for Torus-Based Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:157-178 [Conf ] Craig Gentry How to Compress Rabin Ciphertexts and Signatures (and More). [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:179-200 [Conf ] Qi Cheng On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:201-212 [Conf ] Alexander May Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:213-219 [Conf ] Rosario Gennaro Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:220-236 [Conf ] Giovanni Di Crescenzo , Giuseppe Persiano , Ivan Visconti Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:237-253 [Conf ] Ivan Damgård , Serge Fehr , Louis Salvail Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:254-272 [Conf ] Mihir Bellare , Adriana Palacio The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:273-289 [Conf ] Eli Biham , Rafi Chen Near-Collisions of SHA-0. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:290-305 [Conf ] Antoine Joux Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:306-316 [Conf ] Masayuki Abe , Serge Fehr Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:317-334 [Conf ] Jonathan Katz , Rafail Ostrovsky Round-Optimal Secure Two-Party Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:335-354 [Conf ] Susan Landau Security, Liberty, and Electronic Communications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:355-372 [Conf ] Håvard Molland , Tor Helleseth An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:373-389 [Conf ] Philip Hawkes , Gregory G. Rose Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:390-406 [Conf ] Yi Lu 0002 , Serge Vaudenay Faster Correlation Attack on Bluetooth Keystream Generator E0. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:407-425 [Conf ] Kaoru Kurosawa , Yvo Desmedt A New Paradigm of Hybrid Encryption Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:426-442 [Conf ] Dan Boneh , Xavier Boyen Secure Identity Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:443-459 [Conf ] Tal Moran , Ronen Shaltiel , Amnon Ta-Shma Non-interactive Timestamping in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:460-476 [Conf ] Dario Catalano , David Pointcheval , Thomas Pornin IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:477-493 [Conf ] Yevgeniy Dodis , Rosario Gennaro , Johan Håstad , Hugo Krawczyk , Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:494-510 [Conf ] Michael T. Goodrich , Jonathan Z. Sun , Roberto Tamassia Efficient Tree-Based Revocation in Groups of Low-State Devices. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:511-527 [Conf ] Cynthia Dwork , Kobbi Nissim Privacy-Preserving Datamining on Vertically Partitioned Databases. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:528-544 [Conf ] K. Srinathan , Arvind Narayanan , C. Pandu Rangan Optimal Perfectly Secure Message Transmission. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:545-561 [Conf ] Matthias Fitzi , Stefan Wolf , Jürg Wullschleger Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:562-578 [Conf ]