The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
2004 (conf/eurocrypt/2004)

  1. Michael J. Freedman, Kobbi Nissim, Benny Pinkas
    Efficient Private Matching and Set Intersection. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:1-19 [Conf]
  2. Ben Lynn, Manoj Prabhakaran, Amit Sahai
    Positive Results and Techniques for Obfuscation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:20-39 [Conf]
  3. Gagan Aggarwal, Nina Mishra, Benny Pinkas
    Secure Computation of the k th-Ranked Element. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:40-55 [Conf]
  4. Dan Boneh, Xavier Boyen
    Short Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:56-73 [Conf]
  5. Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
    Sequential Aggregate Signatures from Trapdoor Permutations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:74-90 [Conf]
  6. Ivan Damgård, Thomas Pedersen, Louis Salvail
    On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:91-108 [Conf]
  7. Renato Renner, Stefan Wolf
    The Exact Price for Unconditionally Secure Asymmetric Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:109-125 [Conf]
  8. Stefan Dziembowski, Ueli M. Maurer
    On Generating the Initial Key in the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:126-137 [Conf]
  9. John F. Canny, Stephen Sorkin
    Practical Large-Scale Distributed Key Generation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:138-152 [Conf]
  10. Daniele Micciancio, Saurabh Panjwani
    Optimal Communication Complexity of Generic Multicast Key Distribution. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:153-170 [Conf]
  11. Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
    An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:171-188 [Conf]
  12. Steven Myers
    Black-Box Composition Does Not Imply Adaptive Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:189-206 [Conf]
  13. Ran Canetti, Shai Halevi, Jonathan Katz
    Chosen-Ciphertext Security from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:207-222 [Conf]
  14. Dan Boneh, Xavier Boyen
    Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:223-238 [Conf]
  15. Pierrick Gaudry, Éric Schost
    Construction of Secure Random Curves of Genus 2 over Prime Fields. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:239-256 [Conf]
  16. David Naccache, Nigel P. Smart, Jacques Stern
    Projective Coordinates Leak. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:257-267 [Conf]
  17. Mihir Bellare, Chanathip Namprempre, Gregory Neven
    Security Proofs for Identity-Based Identification and Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:268-286 [Conf]
  18. Liqun Chen, Caroline Kudla, Kenneth G. Paterson
    Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:287-305 [Conf]
  19. Tal Malkin, Satoshi Obana, Moti Yung
    The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:306-322 [Conf]
  20. Luis von Ahn, Nicholas J. Hopper
    Public-Key Steganography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:323-341 [Conf]
  21. Cynthia Dwork, Moni Naor, Omer Reingold
    Immunizing Encryption Schemes from Decryption Errors. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:342-360 [Conf]
  22. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
    Secure Hashed Diffie-Hellman over Non-DDH Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:361-381 [Conf]
  23. Philip D. MacKenzie, Ke Yang
    On Simulation-Sound Trapdoor Commitments. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:382-400 [Conf]
  24. Mihir Bellare, Tadayoshi Kohno
    Hash Function Balance and Its Impact on Birthday Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:401-418 [Conf]
  25. Matthias Fitzi, Thomas Holenstein, Jürg Wullschleger
    Multi-party Computation with Hybrid Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:419-438 [Conf]
  26. Yuval Ishai, Eyal Kushilevitz
    On the Hardness of Information-Theoretic Multiparty Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:439-455 [Conf]
  27. Philippe Golle, Ari Juels
    Dining Cryptographers Revisited. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:456-473 [Conf]
  28. Willi Meier, Enes Pasalic, Claude Carlet
    Algebraic Attacks and Decomposition of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:474-491 [Conf]
  29. Jean-Sébastien Coron
    Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:492-505 [Conf]
  30. Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
    Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:506-522 [Conf]
  31. Yevgeniy Dodis, Leonid Reyzin, Adam Smith
    Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:523-540 [Conf]
  32. Michael Szydlo
    Merkle Tree Traversal in Log Space and Time. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:541-554 [Conf]
  33. Phong Q. Nguyen
    Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:555-570 [Conf]
  34. Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
    Traceable Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:571-589 [Conf]
  35. Stanislaw Jarecki, Vitaly Shmatikov
    Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:590-608 [Conf]
  36. Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup
    Anonymous Identification in Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:609-626 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002